• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back

What does POP stand for?

Post office protocol

What are some of the most important protocols in the protocol stack?

TCP


IP


UDP


POP 3/IMAP 4


SMTP

What are the three main classes of IP addresses?

Class A


Class B


Class C

How many bits make up an IP address?

32

How many host per network are available on a Class C network?

254

When an electrical supplier allows customers access to their inter-network, the result is often called an _______?

Extranet

A protocol suite is often referred to as ______?

Protocol stack

Which protocol is used for sending email?

SMTP-Simple mail transfer protocol

A Class B address can accommodate approximately how many host?

65000

The broadcast address is normally the _____ in the host portion of your address range.

Highest address

Frequently, the ____ is the only route to the world outside the immediate LAN.

Default gateway

What is the default subnet mask of a Class C address?

255.255.255.0

What makes sub-netting possible?

Customizing the subnet mask

An IPv4 address is _____ long, normally written in ______ and is separated by ______?

32 bits


Decimal form


Periods

HOSTS was eventually replaced by ______?

Domain name system

HTTP uses port ____?

80

What is the TCP/IP utility which helps you with DNS names?

Ns lookup

There is a TCP/IP protocol called _____ whose job it is to map IP addresses to physical adresses.

ARP

What type of information will IPCONFIG provide?

Physical address


IP


Subnet mask


Default gateway

What is a socket?

A TCP/IP connection that is based on based on both an IP address and a port runner

Token ring has both a _______ and a _________

Priority mode


Non-priority mode

There are four protocol suites which are important to the network + exam. What are they?

TCP/IP


IPC/SPX


NETBOUI


APPLE TALK

What does type one token ring use STP cable for?

Superior electrical rejection

What is the purpose of AARP?

To map mac address to network address

What are the most common speeds of token ring?

4 and 16 mbps

What are the two main tasks of a router?

1) Determine best path for the packet to the next network


2) switch packet to selected path

One of the most basic characteristics of any ______ pertains to rounting.

Protocol suite

Token ring was developed by _____?

IBM

NetBOUI is not a _______

Routable protocol

What is the name of apples file and printer sharing?

Appletalk

Baud is defined as a single change in the analog signal. What type of change is this referring to?

A change in the amplitude of the signal or a change in the phase

The baud rate of an analog signal is ______?

Number of changes to a signal that occur over one second

In early modems, one baud represented one bit of data. Today's modems use a combination of amplitude changes and phase changes called ______.

Slate changes

The internal modem has a built in ______?

COM port

Modem is short for _____?

Modulator/Demodulator

By using a 4-to-1 compression scheme, a 33,600 bps modem can handle data from the computer _______?

Up to 4x faster or 134,400 mbps

When transmitting information over a telephone carrier, what function does the modem at the receiving end have?

Demodulates the carrier to recover the digital information

The modem converts the digital signal provided by the _____ into an analog signal required by the phone line.

VART

What are the three most common protocol used to connect computers to a remote network?

SLIP- Serial like internet protocol


PPP- Point to point


PPTP- Point to point tunneling

Encryption is a ______ that is used to insure that information can be read only by the _____.

Scrambling/unscrambling


Intended recieptants

Other than PPTP what is another tunneling protocol that is becoming increasingly popular?

L2TP- Layer 2 tunneling protocol

PPTP uses a powerful and _______ scheme that scrambles the data in such a way that no one can unscramble it without the ______.

Automatic encryption


Encryption key

What are the three most common networking protocols that (PPP) can encapsulate?

Netbeui


IPX


ICP/IP

A PRI consists of ______.

23-64 kbps B channels


One 64 kbps D channel

Encapsulation-

Process of placing packets of one protocol inside the packets of another packet