MTA Flashcards

(120 cards)

1
Q

default port used for SMTP

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ping tool is used to

A
  • self test a host’s own network interface

- determine whether a host is reachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 features of DHCP

A
  • address reservation

- ip address exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the command-line tool used to list a host’s active incoming connections is

A

NETSTAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which network does the ip address

220.100.100.100 belong to

A

220.100.100.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a service that resolves NetBios names to ip addresses is

A

Domain Name Service (DNS)

Windows Internet Name Service (WINS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

teredo tunneling is a protocol that

A
  • allows ipv6 connectivity through ipv4

- dynamically allocates ipv6 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

default port used for telnet

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

when a client’s DHCP issued address expires, the client will

A

attempt to obtain a new address by broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a Media Access Control (MAC) address indentifies

A

a network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

two companies want to share data by using the internet. which type of network provides the solution

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN are implemented to provide

A

a secure connection through public networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

if an 802.llg Internet connection has connectivity poblems, what may be the cause

A

electromagnetic interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a network that separates an organization’s private network from a public network is a

A

Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which type of network is most vulnerable to intrusion

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attenuation in a wireless network signal is a result of

A

Distance from the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

which type of network covers the broadest area

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

in LAN topologies, the primary media access methods are

A
  • contention

- token passing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

in a physical star topology, the central device is referred to as a

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

which technology can you use to extend an internal network across shared or public networks

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

which two are published IEEE 802.11 wireless transmission standards

A
  1. 11g

802. 11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what happens when an 802.11b node starts broadcasting within the range of an 802.11g point

A

a connection will be established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

which technology provides the highest bit rate

A

DS3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a VPN is an

A

encrypted connection across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
a topology of a LAN is defined by the
physical an logical characteristics
26
theaximum throughput of an 802.11g network is
54 Mbit/s
27
a node within a LAN must have a network interface device and a
Host address
28
PPP Layer 2 WAN protocol?
yes
29
woch type of port is used to support VLAN traffic between two switches?
Trunk port
30
the protocol that maps IP adresses to a MAC address is
Address Resolution Protocol (ARP)
31
the host name of the fully qualified domain (FQDN) mail.exchange.corp.nwtraders.com is
mail
32
to wich IP configuration does the CIDR notation | 192.168.1.1/25 refer?
192.168.1.1 255.255.255.128
33
which command is used to verify that a server is connected to the network?
PING
34
which represents the Internet Protocol version 6 (IPv6) loopback adress?
::1
35
which is a multicast address?
224.0.0.1
36
which uses pointer records and A records?
DNS server
37
the ipconfig command will
display a client's adress
38
one reason to incorporate VLANs in a network is to
reduce the number of nodes in a broadcast domain
39
FTP application layer protocol
yes
40
top level domain
e.g. com
41
at what layer in the OSI model are hardware adresses referenced?
Data Link
42
you need to devide a network into three subnets. which device would you choose?
Router
43
the type of connector used on a 100 BaseT Ethernet cable is?
RJ-45
44
In addition to switching, multilayer switches also
provide layer 3 routing functions
45
one reason to replace an unamanaged switch with a managed switch is to
support multiple VLANS
46
to directly connect the Ethernet NICs of two computers, you should use a
crossover cable
47
the function of a router is to
?
48
if a router cannot determine the next hop for a packet, the router will
forward the packet to the default route
49
a private network that allows members of an organisation to exchange data is an
Intranet
50
security is a concern on wireless networks due to
the radio broadcast access method
51
a characteristic of the mesh topology is that it
uses redundant paths
52
to protect a network when it is connected to the internet, you should use a
Firewall
53
one purpose of a perimeter network is to
make resources available to the internet
54
which service masks internal ip addresses from outside the network?
NAT
55
the query protocol used to locate resources on a network is
Lightweight Directory Access Protocol (LDAP)
56
tracert is used to
report the route taken by packets across an IP network
57
in wich OSI layer does routing occur?
Network
58
What type of record does DNS use to find a mail service?
Mail Exchanger (EX) DNS record
59
the default gateway address indentifies the
device that will connect the computer to a remote network
60
how many bits are there in an IPv6 address?
128
61
which is a public IP adress?
e.g. 68.24.78.221
62
what is the minimum cabling requirement for a 100BaseTX natwork?
? category 5 UTP cable
63
Internet Key Exchange (IKE) is responsible for which two funktions?
- establishing network speed parameters | - verifying the client's patch level
64
which protocol is a transport layer protocol?
UDP
65
IPv4 multicast addresses range from ... to ...
224.0.0.0 to 239.225.225.225
66
a university has network links between various lications. where would a T3 connection be appropriate?
server to network in the main campus server room
67
which two features of a Windows Server 2008 R2 server should you use install to use that server as a software router?
- Network Policy and Access Services | - Routing and Remote Access Services
68
Which are two characteristics of fiber optic cable?
- support splacing | - requires a polish for end connectors
69
which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?
802.11n
70
what is the bitrate for a North American T3 circuit?
44.736 Mbit/s
71
which feature of Category 5e STP cable reduces external interference?
shielding
72
what are three advantages of VLANs?
- they coparmentalize a network and isolate traffic - they are efficient because a single switch can implement only a single VLAN - they act as though they are on the same LAN regardless of physical location
73
forvwhich two reasons should you use IPsec between computers?
- data compression | - data integrity
74
every router today is FTP capable
yes
75
which wireless communication problem is caused by electromagnetic waves?
interference
76
what are two advantages of using star topology rather than ring topology in a computer lab workgroup?
- a central connection point allows for flexibility and scalability - a cable problem within the group affects two nodes, at most
77
what are three characteristics of Ethernet network topology?
- it can be coaxial, twisted pair or fiber optic media - it comprises the largest share of the networks in place today - it can negotiate different transmission speeds
78
what is a similarity between layer 2 and layer 3 switches?
both forward packets onto the network
79
dynamic routing is fault tolerant
yes
80
what is an example of a layer 3 device that connects multiple computers and networks?
router
81
which meric does Routing Information Protocol use to determine the least costly route?
hop count
82
what are two differences between switches and hubs?
- switches send data to all of the computers that are connected to them for efficiency - switches are capable of sending and receiving data at the same time
83
what is the DNS record type that specifies an alias name of another address record?
CNAME
84
each IPv4 address sonsists of a network ID and a Host ID
yes
85
the SOA RR value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it
yes
86
connectionless, message based protocol with best effort service
UDP
87
connection oriented protocol with guaranteed sevice
TCP
88
resolves IP addresses to MAC addresses
ARP
89
a network that only allows controlled access fot specific business or educational purposes
extranet
90
a network that allows access only to users within an organisation
intranet
91
a system of interconnected networks
internet
92
allows a remote user to connect to a private network from anywhere on the internet
SSL VPN
93
securely connects two portions of a private network or two private networks
site to site VPN
94
creates an unencrypted connection between two network devices
layer 2 tunneling protocol
95
802.11a
frequency range: 5.1-5.8 Ghz | data rate: 54Mbps
96
802.11b
frequency range: 2.4-2.485 Ghz | data rate: 11Mbps
97
802.11g
frequency range: 2.4-2.485 Ghz | data rate: 54Mbps
98
802.11n
frequency range: 2.4-2.485 Ghz or 5.1-5.8 Ghz | data rate: 65-600Mbps
99
star
- each computer is connected by a single cable | - there is a central connectivity device
100
ring
- each workstation acts as a repeater | - each node is connected to exactly two other nodes
101
mesh
- each computer is connected to every othe computer | - the number of connections equals the total number of computers minus one
102
multicast
assigned to one or more network interfaces located on various subnets on the network and used fot one-to-many communications
103
broadcast
assignes to all network interface located on a subnet on the network and used for one-to-everyone-on-a-subnet communications
104
unicast
assigned to a single network interface located on a specific subnet on the network and used for one-to-one communications
105
what is the most common adapter or connector used to connect a computer to a wired network
RJ-45
106
what do you use to create VLANs
switch
107
what standard describes CSMA/CD
802.3
108
what mechanism do wireless networks use to access the network?
CSMA/CD
109
what model promises the most processing power?
distributive computing
110
what type of server does Active Director run on?
network controller
111
what type of communication is sent to a single designated host?
unicast
112
a ___ ist a single computer or device that connects to a TCP/IP network
host
113
what is the central device used in wireless LANs?
wireless access point
114
which layer in the OSI model so MAC addresses and switches use?
data link
115
which layer in the OSI model covers routing between networks?
network
116
which layer in the OSI model is used to verify that data was delivered without error?
network
117
which layer in the OSI model is used to create aconnection so that a host can transfer files?
session
118
which layer in the OSI model includes VLANs?
data link
119
which protocol do you use as the transport protocol for a video application?
UDP
120
which layer in the OSI model is resoinsible for logging on and off?
session