Network Flashcards

(535 cards)

1
Q

is two or more computer systems that are linked by a transmission medium and share one or more protocols that enable them to exchange data.

A

A network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

are devices that send, receive, and forward data

A

The nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are the communications pathways between them

A

the links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

perform a forwarding function

A

Intermediate nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

are those that send and receive data traffic

A

end system nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

also referred to as hosts

A

End systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

makes network applications and resources available to other hosts

A

A server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

consumes the services provided by servers

A

A client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is one where some nodes, such as PCs, laptops, and smartphones, act mostly as clients. The servers are more powerful computers. Application services and resources are centrally provisioned, managed, and secured

A

A client-server network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is one where each host acts as both client and server. This is a decentralized model where provision, management, and security of services and data are distributed around the network. also be referred to as a workgroup

A

A peer-to-peer network; P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

File sharing networks where data is distributed around the clients that use the network. Apart from consuming bandwidth and disk space, ____ sites are associated with hosting malware and illegal material.

A

P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business and enterprise networks are typically

A

client-server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

residential networks are more often ________

A

peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a computer with an operating system and software designed to perform a particular network role. Examples of these roles include the switches, routers, and wireless access points that forward data, the firewalls and intrusion detection systems that enforce security rules, and the load balancers and proxies that improve network performance. Can be deployed as physical hardware or virtual

A

an appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The nodes and links of networking infrastructure are deployed to run services. Services are shared ______that allow the network to do useful work, such as sharing files or allowing employees to send email.

A

applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Networks can be configured with additional properties to perform different ____. For example, the security properties of a virtual private network allow devices to join a local network from across the Internet. As another example, quality of service _____ allows optimization of a network to suit a particularly time-sensitive application, such as voice or video.

A

functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

refers primarily to its size and scope. The size of a network can be measured as the number of nodes, while the scope refers to the area over which nodes sharing the same network address are distributed.

A

A network type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is confined to a single geographical location. In a ___, all nodes and segments are directly connected with cables or short-range wireless technologies. Most of the network infrastructure in a ___ would be directly owned and managed by a single organization.

A

A local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

With an Internet router and a few computers, plus mobile devices, gaming consoles, and printers.

A

example of LAN; Home/residential network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A business-oriented network possibly using a centralized server in addition to client devices and printers, but often still using a single Internet router/switch/access point to provide connectivity.

A

example of LAN; Small office/home office (SOHO) network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A network supporting dozens of users. Such networks would use structured cabling and multiple switches and routers to provide connectivity.

A

example of LAN; Small and medium-sized enterprise (SME) Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A larger network with hundreds or thousands of servers and clients. Such networks would require multiple enterprise-class switch and router appliances to maintain performance levels.

A

example of LAN; Enterprise LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A network that hosts only servers and storage, not end user client devices.

A

example of LAN; Datacenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is a network of networks, connected by long-distance links. connect a main office site with multiple branch office sites, possibly in different countries. could link two or more large LANs or could be used for remote workers connecting to an enterprise network via a public network such as the Internet.

A

A wide area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
describes the physical or logical structure of the network in terms of nodes and links. Network specification that determines the network's overall layout, signaling, and dataflow patterns.
the topology
26
describes the placement of nodes and how they are connected by the transmission media. For example, in one network, nodes might be directly connected via a single cable; in another network, each node might connect to a switching appliance via separate cables.
A network's physical topology
27
describes the flow of data through the network. For example, given the different physical network topologies described previously, if in each case the nodes can send messages to one another, the ____ is the same. The different physical implementations—directly connected via a cable versus connected to the same switch—achieve the same _______.
logical topology
28
a single link is established between two nodes. Because only two devices share the connection, they are guaranteed a level of bandwidth.
point-to-point link
29
point to point; when the network media is ____, a node cannot transmit and receive at the same time
half-duplex
30
point to point; when the network is _____, nodes can transmit and receive simultaneously
full-duplex
31
each endpoint node is connected to a central forwarding appliance, such as a switch or router. The central node mediates communications between the endpoints. most widely used physical topology.
In a star topology
32
has the same physical layout as a star topology but is primarily used in a different context. is more commonly applied to wide area networks (WANs) with remote sites. Network connectivity between multiple virtual private clouds where one virtual private cloud (VPC) acts as a hub and the other VPCs are peered with it but not with each other.
the hub-and-spoke topology
33
is commonly used in WANs, especially public networks such as the Internet. A full _________ requires that each device has a point to point link with every other device on the network. This approach is normally impractical, however. expressed as n(n–1)/2, where n is the number of nodes
A mesh topology
34
consists of a trunk cable with nodes either inserted directly into the trunk or tapped into the trunk using offshoot cables called drop cables. A device called a terminator is placed at both ends of the trunk cable. Their purpose is to absorb signals, preventing them from reflecting repeatedly back and forth on the cable. The major downside of using a ______ is that a broken cable anywhere on the ____ breaks the termination and prevents communications between all devices on the network.
A bus topology
35
connects neighboring nodes until they form a ring or a circle. Signals travel in one direction around the ring, with each device on the network acting as a repeater to send the signal to the next device. A node malfunction or cable break can prevent signals from reaching nodes beyond the malfunction. This interconnectedness can cause difficulties with problem isolation, requiring the troubleshooter to check several physical locations along the ring.
A ring topology
36
Assigns network and hardware components and functions at seven discrete layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Open Systems Interconnection (OSI) reference model
37
OSI Model
7 - Application 6 - Presentation 5 - Session 4 - Transport 3 - Network 2 - Data Link 1 - Physical
38
is a set of rules for exchanging data in a structured format. A ______ has two principal functions: Addressing and Encapsulation
network protocol
39
Describing where data messages should go. At each OSI model layer, there are different mechanisms for identifying nodes and rules for how they can send and receive messages. Unique identifier for a network node, such as a MAC address, IPv4 address, or IPv6 address.
Addressing
40
Describing how data messages should be packaged for transmission. Encapsulation is like an envelope for a letter, with the distinction that each layer requires its own envelope. At each layer, the protocol adds fields in a header to whatever payload data it receives from an application or other protocol. A method by which protocols build data packets by adding headers and trailers to existing data.
Encapsulation
41
Network packet encapsulating a data payload from an upper layer protocol with header fields used at the current layer. At each level (except the Physical layer), the sending node adds a header to the data payload, forming a “chunk” of data called a
protocol data unit (PDU)
42
At each layer, for two nodes to communicate they must be running the same protocol. The protocol running at each layer communicates with its peer layer on the other node. This communication between nodes at the same layer is described as a ____
same layer interaction.
43
To transmit or receive a communication, on each node, each layer provides services for the layer above and uses the services of the layer below. This is referred to as _____
adjacent layer interaction.
44
is responsible for the transmission and receipt of the signals that represent bits of data. Transmission media can be classified as cabled or wireless
The Physical layer (PHY) of the OSI model is defined as layer 1
45
A physical signal conductor is provided between two nodes. Examples include copper or fiber optic . _____ media can also be described as _______.
Cabled; bounded media
46
Uses free space between nodes, such as microwave radio. _____ media can also be described as ____
Wireless; unbounded media.
47
The Physical layer specifies the following:
Physical topology, physical interface, and signaling
48
The layout of nodes and links as established by the transmission media. An area of a larger network is called a segment. A network is typically divided into segments to cope with the physical restrictions of the network media used, to improve performance, or to improve security. At the Physical layer, a segment is where all the nodes share access to the same media.
Physical topology
49
Mechanical specifications for the network medium. For cabled media, this means the construction of the cable, the interface/connector form factor, and the number and functions of the pins in a connector. For wireless media, it means radio transceiver and antenna specifications.
Physical interface
50
The process of transmitting and receiving encoded data over the network medium. A modulation scheme describes how electrical, light, or radio signals represent bits. Timing and synchronization schemes ensure senders and receivers can identify groups of signals as a chunk or frame of data.
Signaling
51
Devices that operate at the Physical layer include the following:
Transceiver, Repeater, Hub, and Media converter
52
The part of a network interface that sends and receives signals over the network media. Component in a network interface that converts data to and from the media signaling type. Modular _______ are designed to plug into switches and routers.
transceiver
53
A device that amplifies an electronic signal to extend the maximum allowable distance for a media type. Layer 1 device that regenerates and retransmits signals to overcome media distance limitations.
Repeater
54
A multiport repeater, deployed as the central point of connection for nodes. Layer 1 (Physical) network device used to implement a star network topology on legacy Ethernet networks, working as a multiport repeater.
Hub
55
A device that converts one media signaling type to another.
Media converter
56
It is responsible for transferring data between nodes on the same logical segment. a segment is one where all nodes can send traffic to one another using hardware addresses, regardless of whether they share access to the same media.
Layer 2 is referred to as the Data Link layer.
57
A layer 2 segment might include multiple physical segments. This is referred to as a _____
logical topology.
58
also performs an encapsulation function. It organizes the stream of bits arriving from the Physical layer into structured units called frames.
The Data Link layer
59
Common term for the protocol data unit for layer 2. Each ___ contains a Network layer packet as its payload. The Data Link layer adds control information to the payload in the form of header fields. These fields include source and destination hardware addresses, plus a basic error check to test if the ___ was received intact.
frames
60
Devices that operate at the Data Link layer include the following:
Network adapter or NIC, Bridge, Switch, and Wireless access point
61
joins an end system host to network media (cabling or wireless) and enables it to communicate over the network by assembling and disassembling frames.
Network adapter or network interface card (NIC)
62
is a type of intermediate system that joins physical network segments while minimizing the performance reduction of having more nodes on the same network; has multiple ports, each of which functions as a network interface.
Bridge
63
An advanced type of bridge with many ports. A switch creates links between large numbers of nodes more efficiently. Intermediate system used to establish contention-free network segments at OSI layer 2 (Data Link). An unmanaged _____ does not support any sort of configuration.
Switch
64
allows nodes with wireless network cards to communicate and creates a bridge between wireless networks and wired ones. A device that provides a connection between wireless devices and can connect to wired networks, implementing an infrastructure mode WLAN.
Wireless access point (AP)
65
This layer is responsible for moving data around a network of networks, known as an internetwork. moves information around an internetwork by using logical network and host IDs.
Layer 3 is the Network layer.
66
The main appliance working at layer 3 is ______
the router.
67
A basic firewall operates at ______ to enforce an access control list (ACL). A network ACL is a list of the addresses and types of traffic that are permitted or blocked.
layer 3
68
also known as the end-to-end or host-to-host layer. One of the functions of the Transport layer is to identify each type of network application by assigning it a port number. For example, data requested from an HTTP web application can be identified as port 80, while data sent to an email server can be identified as port 25.
Transport layer - layer 4 of the OSI model
69
can also implement reliable data delivery mechanisms, should the application require it. Reliable delivery means that any lost or damaged packets are resent.
The Transport layer
70
Devices working at the____ include multilayer switches - usually working as load balancers - and many types of security appliances, such as more advanced firewalls and intrusion detection systems (IDSs).
Transport layer
71
Most application protocols require the exchange of multiple messages between the client and server. This exchange of such a sequence of messages is called a _______._______represents functions that administer the process of establishing a _____, managing data transfer, and then ending (or tearing down) ________.
session or dialog; The Session layer (layer 5); dialog; session
72
transforms data between the format required for the network and the format required for the application. is used for character set conversion, such as between American Standard Code for Information Interchange (ASCII) and Unicode.
The Presentation layer (layer 6)
73
is at the top of the OSI stack. provide an interface for software programs on network hosts that have established a communications channel through the lower-level protocols to exchange data. OSI model layer providing support to applications requiring network services (file transfer, printing, email, databases, and so on).
The Application layer (layer 7)
74
Which of the following functions are performed by the OSI Transport layer? (Select three.) Packet formatting for delivery through a medium -Data segmentation and reassembly -End-to-end flow control -Path identification and selection -Reliable message delivery -Media access control, logical topology, and device identification -Consistent data formatting between dissimilar systems
-Data segmentation and reassembly -End-to-end flow control -Reliable message delivery
75
A communications engineer notices that every time it rains the signal becomes very degraded. Which layer of the OSI model is the engineer most likely troubleshooting? -Physical -Data Link -Transport -Application
-Physical The physical layer (PHY) of the OSI model (layer 1) is responsible for the transmission and receipt of the signals that represent bits of data from one node to another node. Wireless is one medium.
76
is the term used to describe the form that data takes at each layer of the OSI model. As data traverses down the layers on the sending node, each layer encapsulates the data by adding its specific headers (and sometimes footers), creating a PDU appropriate for that layer. This process ensures that data can be correctly processed, transmitted, and understood at each stage of its journey. A chunk of data with protocol-specific headers added at each OSI layer
Protocol Data Unit (PDU)?
77
is a category of LAN with a small number of computing hosts that typically rely on a single integrated appliance for local and Internet connectivity.
Small office/home office (SOHO)
78
one of its primary functions is to forward traffic between the LAN and the WAN
SOHO router
79
Starting at layer 1, the SOHO router provides the following physical interfaces:
Radio antennae to transmit and receive wireless signals. A number of RJ45 ports, labeled as the LAN ports. A type of modem to connect to the ISP's network. labeled as the WAN port
80
At layer 2, the SOHO router implements the following functions to make use of its Physical layer adapters:
Ethernet switch Wireless access point At this layer, each host interface is identified by a media access control (MAC) address.
81
At layer 3, the Network layer, the routing part of the SOHO router:
makes forwarding decisions between the local private network and public Internet. These zones are distinguished by Internet Protocol (IP) addresses. The router runs a Dynamic Host Configuration Protocol (DHCP) server to allocate a unique address to each host that connects to it over either an Ethernet port or via the wireless access point.
82
Transport and Application Layer and Security Functions for SOHO router:
The SOHO router can apply filtering rules to traffic sent between the public and private zones, implementing a firewall. The firewall can be configured to block traffic based on source or destination IP addresses and also on the type of application. At layer 4, each application is identified by a port number. The firewall in the router can be configured with rules specifying behavior for each port
83
_______ is described as customer premises equipment (CPE)
The SOHO router
84
Manages allocation of IP addresses and maintenance of the top-level domain space. currently run by Internet Corporation for Assigned Names and Numbers (ICANN). allocates addresses to regional registries that then allocate them to local registries or ISPs.
Internet Assigned Numbers Authority (IANA) (iana.org)
85
Focuses on solutions to Internet problems and the adoption of new standards, published as Requests for Comments (RFCs). Some RFCs describe network services or protocols and their implementation, while others summarize policies. An older RFC is never updated. If changes are required, a new RFC is published with a new number. Not all RFCs describe standards. Some are designated informational, while others are experimental. The official repository for RFCs is at rfc-editor.org.
Internet Engineering Task Force (IETF) (ietf.org)
86
decimal numbering is also referred to as ___; means that each digit can have one of ten possible values (0 through 9). A digit positioned to the left of another has 10 times the value of the digit to the right. For example, the number 255 can be written out as follows: (2x10x10)+(5x10)+5
base 10.
87
Binary is ____, so a digit in any given position can only have one of two values (0 or 1), and each place position is the next power of 2. The binary value 11111111 can be converted to the decimal value 255 by the following sum: (1x2x2x2x2x2x2x2)+(1x2x2x2x2x2x2)+(1x2x2x2x2x2)+(1x2x2x2x2)+(1x2x2x2)+(1x2x2)+(1x2)+1
base 2
88
is a convenient way of referring to the long sequences of bytes used in some other types of network addresses, such as hardware MAC addresses.
Hexadecimal notation (or hex
89
Which of the following interfaces does a SOHO router provide at the Physical Layer of the OSI model? (Select three.) -WAN port for Internet Service Provider (ISP) connection -VGA ports for video output -Radio antennas for wireless signal transmission -USB ports for direct computer connection -SATA ports for internal storage connection -HDMI ports for multimedia streaming -RJ-45 ports for a local cabled network
-WAN port for Internet Service Provider (ISP) connection -Radio antennas for wireless signal transmission -RJ-45 ports for a local cabled network
90
What do Internet Service Providers (ISPs) use to establish links between their networks within an Internet eXchange Point (IXP) data center? -Peer-to-peer file sharing -Transit and peering arrangements -Bluetooth connectivity -NFC (Near Field Communicatio
-Transit and peering arrangements Within an Internet eXchange Point (IXP) data center, ISPs establish links between their networks using transit and peering arrangements. These arrangements allow them to carry traffic to and from parts of the Internet they do not physically own, facilitating the exchange of internet traffic between different ISPs' networks.
91
Which of the following BEST describes a demarcation point in the context of telecommunications? -The maximum data transfer rate achievable by the ISP -The central hub where all ISPs connect and exchange data -The point at which the telco's cabling enters the customer premises -The protocol used for encrypting data over the Internet
-The point at which the telco's cabling enters the customer premises The demarcation point (often shortened to "demarc") is the point where the telecommunications company's (telco's) responsibility ends and the customer's responsibility begins; typically where the telco's cabling enters the building or premises.
92
Which of the following functions does a SOHO router implement at layer 2 to make use of its Physical layer adapters? (Select two.) -Firewall -Ethernet switch -Wireless access point -Network Address Translation (NAT) -DHCP server
-Ethernet switch -Wireless access point The following are the functions that a SOHO router implements: Ethernet switch. The RJ-45 jacks on a SOHO router are connected internally by an Ethernet switch, allowing multiple wired devices to communicate within the same network segment. This is a key function at layer 2, facilitating the use of Physical layer adapters for wired connections. Wireless access point. A SOHO router includes a wireless access point, which uses radio antennas to implement a version of the Wi-Fi standard. This allows wireless devices such as PCs, tablets, smartphones, and printers to form a network. The access point is also connected to the Ethernet switch internally, bridging the wired and wireless segments into a single logical data link network.
93
What is the decimal form of the following binary IP address? 11001101.00111001.10101001.01000010 -206.58.170.67 -205.57.169.66 -238.90.202.99 -190.42.154.51
-205.57.169.66 To convert from binary to decimal, use the decimal equivalent of the following binary numbers: 10000000: 128 01000000: 64 00100000: 32 00010000: 16 00001000: 8 00000100: 4 00000010: 2 00000001: 1 To find the decimal form of a binary number, add up each decimal equivalent for each 1 bit in the address. For example, the equation for the number 11001101 is 128 + 64 + 8 + 4 + 1 = 205.
94
CompTIA Network+ troubleshooting methodology:
1. Identify the problem 2. Establish a theory of probable cause 3. Test the theory to determine cause 4. Establish a plan of action to resolve the problem and ID potential effects 5. Implement the solution or escalate as necessary 6. Verify full system functionality and implement preventive measures 7. Document findings, actions, outcomes, and LL
95
Which of the following MOST correctly describes using the divide and conquer approach of the OSI model for troubleshooting network issues? -Starting the troubleshooting process at the Physical Layer (Layer 1) and sequentially checking each layer until the Application Layer (Layer 7) is reached -Focusing solely on the Application Layer (Layer 7) to identify and resolve any software-related issues before considering network infrastructure problems -Identifying the most likely layer causing the issue based on symptoms and preliminary information, then working either up or down the OSI model as needed to isolate and resolve the problem -Checking all layers of the OSI model simultaneously to quickly identify and resolve network issues without considering the logical order of the layers
-Identifying the most likely layer causing the issue based on symptoms and preliminary information, then working either up or down the OSI model as needed to isolate and resolve the problem
96
_______ works by modulating the properties of a transmission medium—electric current, infrared light, or radio waves—to encode a signal.
Network data transfer
97
Higher frequencies allow for more data to be transferred per second. The range of frequencies is referred to as the _____
media bandwidth.
98
refers to the methods a network technology uses to determine when nodes can communicate on shared media and to deal with possible problems, such as two devices attempting to communicate simultaneously.
Media access control (MAC)
99
Network segment where nodes are attached to the same shared access media, such as a bus network or Ethernet hub.
collision domain
100
The Ethernet protocol governing contention and media access is called ____
Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
101
100BASE-TX refers to ______ working over Cat 5 (or better) twisted pair copper cable with a maximum supported link length of 100 meters (328 feet). raising the bit rate from 10 Mbps to 100 Mbps.
Fast Ethernet
102
To support compatibility with hosts still equipped with 10 Mbps Ethernet interfaces, Fast Ethernet introduced an ________ to allow a host to choose the highest supported connection parameters (10 or 100 Mbps and half- or full-duplex).
autonegotiation protocol
103
10GBASE-T UTP (Cat 6) F/UTP (Cat 6A) S/FTP (Cat 7)
55 m (180 feet) 100 m (328 feet) 100 m (328 feet)
104
40GBASE-T S/FTP (Cat 8)
30 m (100 feet)
105
uses infrared light signals. The light signals are also not susceptible to interference or noise from other sources and less effected by attenuation. supports higher bandwidth over longer links than copper cable.
Fiber optic cable
106
100BASE-FX
Optics - 1300 nm Cable - MMF (OM1) Max Dist. - 4km (2.48miles) Connectors - ST, SC, MT-RJ
107
100BASE-SX
Optics -850 nm Cable -MMF (OM1), MMF (OM2) Max Dist - 300 m (984 feet) Connectors - ST, SC, LC
108
1000BASE-SX
Optics - 850 nm Cable - MMF (OM1), MMF (OM2), MMF (OM3) Max Dist. - MMF (OM1) 275 m (902 feet), 550 m (1804 feet) Connectors - ST, SC, LC, MT-RJ
109
1000BASE-LX
Optics -1,300 nm, 1,310 nm Cable -MMF (OM1/OM2/OM3), SMF (OS1/OS2) Max Dist. - 550 m (1,804 feet), 5 km (3.1 miles) Connectors - SC, LC
110
10GBASE-SR
Optics - 850 nm Cable - MMF (OM1) 33 m (108 feet), MMF (OM2) 82 m (269 feet), MMF (OM3) 300 m (984 feet), MMF (OM4) 400 m (1,312 feet) Connectors - SC, LC
111
10GBASE-LR
Optics - 1,310 nm Cable - SMF (OS1/OS2) Max Dist. - 10 km (6.2 miles) connectors - SC, LC
112
For what reason might a company deploy 10/40 GbE Ethernet in its network? -To reduce overall network costs -To support very high bandwidth data transfers -To meet the standard for all new installations -To avoid using fiber optic cable
-To support very high bandwidth data transfers A company might deploy 10/40 GbE Ethernet in its network to support very high bandwidth data transfers, which could be required for business operations such as TV and film production. 10/40 GbE might be used where a company's business requires very high bandwidth data transfers.
113
is a phenomenon whereby one pair causes interference in another as a result of their proximity.
Crosstalk
114
uses a single thick wire per conductor and is used for cables that run behind walls or through ducts. uses thicker 22 to 24 AWG
Solid cabling
115
uses thin filament wires wrapped around one another and is used to make flexible patch cords for connecting computers to wall ports and switch ports to patch panel ports. often 26 AWG
Stranded cabling
116
Copper wire thickness is measured using
American Wire Gauge (AWG)
117
has one thin outer foil shield around all pairs.
Screened cable; usually designated as screened twisted pair (ScTP) or foiled/unshielded twisted pair (F/UTP), or sometimes just foiled twisted pair (FTP).
118
has a braided outer screen and foil-shielded pairs
Fully shielded cabling; shielded/foiled twisted pair (S/FTP). There are also variants with a foil outer shield (F/FTP)
119
able has foil-shielded pairs but no outer shield.
U/FTP
120
Cat5e (class D)
cable type -UTP or F/UTP Ethernet standard - 1000BASE-T Max Dist. - 100 m (328 ft) Frequency -100 MHz Connector- RJ45
121
Cat6 (class E)
cable type -UTP, F/UTP, or U/FTP Ethernet standard - 1000BASE-T 100 m (328 ft), 10GBASE-T 55 m (180 ft) Frequency - 250 MHz connector - RJ45
122
Cat 6A (class Ea)
cable type -UTP, F/UTP, U/FTP, or S/FTP Ethernet standard -10GBASE-T Max Dist. -100 m (328 ft) Frequency -500 MHz Connector - RJ45
123
Cat 7 (class F)
cable type -S/FTP or F/FTP Ethernet standard -10GBASE-T Max Dist. - 100 m (328 ft) Frequency -600 MHz Connector - GG45/TERA
124
Cat 8/8.1 (class I)
Cable type - F/FTP or S/FTP Ehternet standard -40GBASE-T Max Dist. - 30 m (100 ft) Frequency -2,000 MHz Connector - GG45/TERA
125
is a void in a building designed to carry heating, ventilation, and air conditioning (HVAC) systems. is typically a false ceiling, though it could also be constructed as a raised floor.
A plenum space
126
is made of two conductors that share the same axis. The core conductor is made of solid or stranded copper wire and is enclosed by plastic insulation. A wire mesh wrapped around the plastic constitutes the second conductor. This serves as shielding from interference.
Coaxial (or coax) cable
127
is similar to coax but contains two inner conductors. Twinax is used for datacenter interconnects working at 10 GbE (unofficially referred to as 10GBASE-CR) and 40 GbE (40GBASE-CR4). maximum distance is up to about 5 meters for passive cable types and 10 meters for active cable types.
Twinaxial (or twinax)
128
What is the main difference between screened cabling and fully shielded cabling? -Screened cabling uses a braided outer screen only. -Fully shielded cabling uses foil-shielded pairs without an outer shield. -Screened cabling has one thin outer foil shield around all pairs. -Fully shielded cabling has no shielding at all.
-Screened cabling has one thin outer foil shield around all pairs.
129
Which type of conductor wire is typically used for cables that run behind walls or through ducts? -Stranded -Solid -Coaxial -Fiber optic
-Solid Solid cabling uses a single thick wire per conductor and is used for permanent installations that run behind walls or through ducts because of its lower attenuation over longer distances. Stranded conductor wires are used to make flexible patch cords for connecting devices, not for permanent installations behind walls or through ducts.
130
In a telephone system, what is the primary function of the center two contacts in an RJ11 connector? -They are used to provide power to the telephone unit. -They carry the dial tone and voice circuit. -They are reserved for future technological advancements. -They enhance the signal quality for internet connections.
-They carry the dial tone and voice circuit.
131
Which of the following statements is true regarding the use of plenum-rated cables in place of riser-rated cables? -Plenum-rated cables can never be used in place of riser-rated cables due to their different fire safety standards. -Plenum-rated cables can be used in place of riser-rated cables, but not vice versa. -Riser-rated and plenum-rated cables are interchangeable with no restrictions. -Using plenum-rated cables in place of riser-rated cables reduces the overall bandwidth of the network.
-Plenum-rated cables can be used in place of riser-rated cables, but not vice versa. Plenum-rated cables are designed to meet stricter fire safety standards than riser-rated cables, making them suitable for use in more demanding environments, such as plenum spaces. Because of these higher standards, plenum-rated cables can be used in applications requiring riser-rated cables, but the reverse is not true due to the lower fire safety standards of riser-rated cables. Riser-rated cables cannot be used in place of plenum-rated cables due to the lower fire safety standards of riser-rated cables. The interchangeability is not reciprocal.
132
Which organizations have created categories of cable standards for twisted pair to simplify the selection of a suitable quality cable? -IEEE and IETF -ANSI and TIA/EIA -ISO and IEC -ITU and ETS
-ANSI and TIA/EIA The American National Standards Institute (ANSI) and the Telecommunications Industry Association (TIA)/Electronic Industries Alliance (EIA) are responsible for creating categories of cable standards for twisted pair cables. This simplifies the process of selecting a suitable quality cable for telecommunications purposes.
133
ANSI/TIA/EIA 568 Commercial Building Telecommunications Wiring Standard.
Work Area Horizontal Cabling Telecommunications Room Backbone Cabling Entrance Facilities/Demarc
134
The space where user equipment is located and connected to the network, usually via a patch cable plugged into a wall port.
Work Area
135
Connects user work areas to an intermediate distribution frame (IDF). it typically consists of the cabling for a single floor and so is made up of cables run horizontally through wall ducts or ceiling spaces. When using copper cabling, the IDF must be within 90 m (295 feet) cabling distance of each wall port. If this is not possible, multiple IDFs must be provisioned. Multiple IDFs on the same floor are linked by horizontal cross connects.
Horizontal Cabling
136
Room or closet that houses an intermediate distribution frame and networking equipment, such as switches. Essentially, this is a termination point for the horizontal cabling along with a connection to backbone cabling. This wiring closet must be used only for networking equipment (not general storage) and should ideally be secured by a lockable door.
Telecommunications Room
137
Connects IDFs to a main distribution frame (MDF). also referred to as vertical cabling, as it is more likely to run up and down between floors.
Backbone Cabling
138
Special type of telecommunications room marking the point at which external cabling is joined to internal cabling, via the MDF. Entrance facilities are required to join the local exchange carrier's (LEC's) network and for inter-building communications. The demarcation point is where the access provider's network terminates and the organization's network begins.
Entrance Facilities/Demarc
139
EIA/TIA 568 A Standard
1- green with stripes 2 - green 3 - orange with stripes 4 - blue 5 - blue with stripes 6 - orange 7 - brown with stripes 8 - brown
140
EIA/TIA 568 B Standard
1 - orange with stripes 2 - orange 3 - green with stripes 4 - blue 5 - blue with stripes 6 - green 7 - brown with stripes 8 - brown
141
Type of distribution frame used with twisted pair cabling with IDCs to terminate fixed cabling on one side and modular jacks to make cross-connections to other equipment on the other. Also called a patch bay.
a patch panel
142
Installing structured cable from a bulk spool is referred to as ______ because the cable must be pulled, carefully, from the telecommunications closet to the work area.
pulling cable
143
A single optical fiber is constructed from three elements:
Core provides the transmission path, or waveguide, for the light signals. Cladding reflects signals back into the waveguide as efficiently as possible. Buffer is a protective plastic coating.
144
In basic operation modes, each fiber optic strand can only transfer light in a single direction at a time.
Therefore, multiple fibers are often bundled within a cable to allow simultaneous transmission and reception of signals or to provide links for multiple applications.
145
has a small core (8 to 10 microns) and a long wavelength. It uses a laser to generate a near infrared (1,310 nm or 1,550 nm) light signal. support data rates up to 100 Gbps and cable runs of many kilometers, depending on the quality of the cable and optics. OS1 is designed for indoor use, while OS2 is for outdoor deployment.
Single Mode Fiber (SMF)
146
has a larger core (62.5 or 50 microns) and shorter wavelength light (850 nm or 1,300 nm) transmitted in multiple waves of varying length. uses less expensive optics and consequently is less expensive to deploy. it does not support such high signaling speeds or long distances as single mode and so is more suitable for LANs than WANs.
Multimode Fiber (MMF)
147
Classification system for multimode fiber designating core size and modal bandwidth.
optical multimode (OM) categories
148
OM1/OM2
62.5-micron cable is OM1, while early 50-micron cable is OM2. OM1 and OM2 are mainly rated for applications up to 1 Gbps and use LED transmitters.
149
OM3/OM4
These are also 50-micron cable, but manufactured differently, designed for use with 850 nm vertical-cavity surface-emitting lasers (VCSEL), also referred to as laser optimized MMF (LOMMF). A VCSEL is not as powerful as a laser type used for SMF, but it supports higher modulation (transmitting light pulses rapidly) than LED-based optics.
150
is an early bayonet-style connector that uses a push-and-twist locking mechanism. ST was used mostly for multimode networks, but it is not widely used for Ethernet installations anymore.
Fiber optic connector -Straight Tip (ST)
151
is a push/pull design, allowing for simple insertion and removal. It can be used for single- or multimode. It is commonly used for Gigabit Ethernet.
fiber optic connector - The Subscriber Connector (SC)
152
is a small-form-factor connector with a tabbed push/pull design. similar to SC, but the smaller size allows for higher port density. is a widely adopted form factor for Gigabit Ethernet and 10/40 GbE.
fiber optic connector - The Local Connector (LC) (also referred to as Lucent Connector)
153
The faces of the connector and fiber tip are polished so that they reduce back reflection, curve slightly, and fit together better.
Ultra Physical Contact (UPC)
154
The faces are angled for an even tighter connection. APC cannot be mixed with PC or UPC.
Angled Physical Contact (APC)
155
OM1 OM2 OM3/OM4 SMF PC/UPC SMF APC
Orange Beige Orange Black Aqua Aqua Yellow Blue Yellow Green
156
Type of distribution frame with pre-wired connectors used with fiber optic cabling.
fiber distribution panel
157
Fiber optic cable type that terminates multiple strands to a single compact connector, supporting parallel links. termination allows for low-footprint backbone or trunk cabling. backbone ribbon cable bundles 12 or more strands terminated to a single compact ferrule.
Multi-fiber push-on (MPO)
158
uses one transmit lane and one receive lane and requires two fiber strands.
A duplex fiber channel link
159
uses bundles of lanes working at 10 Gbps or 25 Gbps to implement 40 Gbps or 100 Gbps links. These channel links require between eight and twenty strands.
Parallel fiber
160
is a means of using one or two strands to provision multiple channels.
Wavelength Division Multiplexing (WDM)
161
support transmit and receive signals over the same strand of fiber. must be installed in opposite pairs, so the downstream transceiver would have to use 1,490 nm for Tx and 1,310 for Rx.
Bidirectional (BiDi) transceivers
162
System that allows bidirectional data transfer over a single fiber strand by using separate wavelengths for transmit and receive streams.
Bidirectional wavelength division multiplexing (BWDM)
163
supports up to 16 wavelengths and is typically used to deploy four or eight bidirectional channels over either a single fiber strand or unidirectional channels over dual fiber strands (one strand for transmit, the other for receive). transceivers support multi-channel 1 G, 10 G, and 40 G Ethernet links. The transceivers must be installed in opposite pairs.
Coarse Wavelength Division Multiplexing (CWDM)
164
provisions greater numbers of channels (20, 40, 80, or 160). This means that there is much less spacing between each channel and that it requires more precise and expensive lasers. transceivers support multi-channel 1 G, 10 G, and 40 G Ethernet links. The transceivers must be installed in opposite pairs.
Dense Wavelength Division Multiplexing (DWDM)
165
What is the primary purpose of Wavelength Division Multiplexing (WDM)? -To reduce the bandwidth of individual channels -To provision multiple channels over one or two strands of fiber -To increase the latency of data transmission -To decrease the overall data transmission rate
-To provision multiple channels over one or two strands of fiber. WDM allows for the transmission of multiple data channels over a single or dual fiber strand(s) by using different wavelengths for each channel, thereby increasing the capacity of the fiber without needing additional strands.
166
What is a major difference when comparing Dense Wavelength Division Multiplexing (DWDM) to CWDM? -DWDM supports fewer channels than CWDM. -DWDM requires less precise lasers than CWDM. -DWDM provisions greater numbers of channels with much less spacing between each channel. -DWDM is typically used for shorter distance transmissions than CWDM.
-DWDM provisions greater numbers of channels with much less spacing between each channel. DWDM can support a higher number of channels (20, 40, 80, or 160) by using much tighter wavelength spacing, requiring more precise and expensive lasers compared to CWDM.
167
What does Bidirectional Wavelength Division Multiplexing (BiDi) use to support transmit and receive signals over the same strand of fiber? -Identical wavelengths for Tx and Rx signals -Slightly shifted wavelengths for Tx and Rx signals -Increased power levels for Tx signals only -Decreased power levels for Rx signals only
-Slightly shifted wavelengths for Tx and Rx signals. BiDi transceivers use slightly different wavelengths for transmitting (Tx) and receiving (Rx) signals over the same fiber strand, such as 1310 nm for Tx and 1490 nm for Rx, allowing for bidirectional communication on a single strand.
168
How does an MPO connector capable of carrying 24 or 32 fibers compare in footprint to a duplex LC pair? -It requires more space than a duplex LC pair. -It has the same footprint as a duplex LC pair. -It is only suitable for single-mode fibers. -It is twice as large as a duplex LC pair.
-It has the same footprint as a duplex LC pair. An MPO connector, even when capable of carrying 24 or 32 fibers, has the same footprint as a duplex LC pair. This compact design allows for high-density fiber connections without requiring additional space.
169
How many fiber strands are required for a 40 Gbps link comprising 4 x 10 Gbps lanes using Multi-fiber Push On (MPO) connectors? 4 strands 8 strands 12 strands 16 strands
8 strands A 40 Gbps link comprising 4 x 10 Gbps lanes requires eight strands because each 10 Gbps lane requires two fiber strands (one for sending and one for receiving). Therefore, for 4 lanes, the total is 4 lanes x 2 strands per lane = 8 strands. This efficient use of strands is one of the advantages of MPO connectors in aggregating multiple lanes into a single optical link.
170
What does the TIA/EIA cabling standard require for fiber patch cord polarity? -An even number of elements in the link, such as two patch cords and two permanent links -No requirement for crossover in the link elements -A direct connection without the use of patch cords -An odd number of elements in the link, such as two patch cords and a permanent link
-An odd number of elements in the link, such as two patch cords and a permanent link. The TIA/EIA cabling standard specifies that for maintaining correct fiber patch cord polarity, there must be an odd number of elements in the link. This configuration ensures that the correct polarity is maintained from one end of the connection to the other. The elements typically include patch cords and a permanent link. Having an odd number of elements ensures that a crossover occurs at each connection point, correctly aligning the transmit (Tx) and receive (Rx) signals.
171
How can you identify transmitted optical signals when working with fiber optic patch cords? -By listening for a distinct sound emitted by the fiber optic cable -By feeling the temperature change on the surface of the cable -By observing bright white spots through a smartphone camera -By measuring the weight of the fiber optic cable
-By observing bright white spots through a smartphone camera. When working with fiber optic patch cords, transmitted optical signals can be identified by observing bright white spots through a smartphone camera. This method leverages the camera's sensitivity to the specific wavelength of light transmitted through the fiber. While the human eye cannot directly see these light wavelengths, a smartphone camera can detect them, appearing as bright white spots on the camera's display. This technique is a practical way to identify which fiber is actively transmitting light, aiding in troubleshooting and verifying connections.
172
Multi-mode fiber is designed to operate at which of the following wavelengths? -850 nm and 1300 nm -1310 nm and 1550 nm -850 nm and 1310 nm -1300 nm and 1550 nm
-850 nm and 1300 nm Multi-mode fiber is designed to operate at 850 nm and 1300 nm. Single-mode fiber is optimized for 1310 nm and 1550 nm.
173
is a specially configured steel shelving system designed for standard-size equipment. Using a rack allows equipment to be stored more securely and compactly than ordinary desks or shelving would allow for. The concept of installing more computing appliances in a smaller space is referred to as density.
A rack
174
Rack height is measured in
"U" units of 1.75" / 4.45 cm. Racks are sold in heights from 8U to 48U. Rack-compatible equipment is designed with a vertical height quoted in U so you can plan exactly how much vertical space you require.
175
Multiple rows should be placed back-to-back not front to back to maximize cooling. This is referred to as a _____
hot aisle/cold aisle layout.
176
Sensors can also be installed to measure ambient environmental conditions for a network rack or enclosure or within a server room or equipment closet. The following environmental factors need monitoring:
Temperature Humidity Electrical Flooding
177
An advanced strip socket that provides filtered output voltage. A managed unit supports remote administration. has circuitry to "clean" the power signal, provides protection against spikes, surges, and under-voltage events, and can integrate with an uninterruptible power supply (UPS).
power distribution unit (PDU)
178
will provide a temporary power source in the event of a power failure. runtime may range from a few minutes for a desktop-rated model to hours for an enterprise system.
uninterruptible power supply (UPS
179
works on the principle that a fire requires heat, oxygen, and fuel to ignite and burn.
The fire triangle
180
_____ fire extinguishers are designed to combat fires fueled by ordinary combustible materials like wood, paper, cloth, and plastics
Class A
181
_______ extinguishers use gas-based extinguishing and can be used where the risk of electric shock makes other types unsuitable
Class C
182
These are used in areas where freezing is possible; water only enters this part of the system if sprinklers elsewhere are triggered.
Dry-pipe
183
A pre-action system only fills with water when an alarm is triggered; it will then spray when the heat rises. This gives protection against accidental discharges and burst pipes and gives some time to contain the fire manually before the sprinkler operates.
Pre-action
184
Gas-based systems have the advantage of not short circuiting electrical systems and leaving no residue. has been banned in most countries as it is ozone depleting, though existing installations have not been replaced in many instances and can continue to operate legally.
Halon
185
As well as not being environmentally damaging, these gases are considered nontoxic to humans. Examples include INERGEN (a mixture of CO2, Argon, and Nitrogen), FM-200/HFC-227, and FE-13. The gases both deplete the concentration of oxygen in the area (though not to levels dangerous to humans) and have a cooling effect. CO2 can be used too, but it is not safe for use in occupied areas.
Clean agent
186
Which of the following is a correct statement about the installation of rack-mounted appliances? -Appliances should always be installed on the topmost rack for easy access. -Appliances can be screwed directly into the rack if there is little need for maintenance. -All appliances must be installed using rail kits for safety reasons. -Non-standard components cannot be installed in racks under any circumstances.
-Appliances can be screwed directly into the rack if there is little need for maintenance.
187
What is the primary function of blanking plates in a rack system? -To provide additional support to the equipment -To improve airflow -To enhance the aesthetic appearance of the rack -To increase the rack's weight capacity
-To improve airflow
188
Which of the following do internal sensors within servers and appliances normally monitor? (Select three.) -Length of Ethernet cables connected to the device -Excessive temperatures within the device chassis -Brand of RAM installed in the device -Weight of the server rack -Physical location of Wi-Fi routers -Fan speeds -Component failure
-Fan speeds -Component failure -Excessive temperatures within the device chassis
189
What type of sprinkler system holds water at high pressure and discharges water when triggered by heat? -Dry-pipe -Pre-action -Wet-pipe -Halon
-Wet-pipe Wet-pipe sprinkler systems constantly hold water at high pressure and discharge water when triggered by heat, making them quick to respond to fires. Dry-pipe systems are used in areas where freezing is possible. Pre-action systems require an alarm trigger before filling with water. Halon is a gas-based fire suppression system.
190
In a high-rise office building, the fire alarm system detects smoke on one of the floors. The building is equipped with a sophisticated fire suppression system that includes automatic smoke detectors, manual alarm points, and a combination of wet-pipe and pre-action sprinkler systems. The fire is located in a storage room filled with paper products, which is adjacent to the server room. Given the situation, which immediate action should the building's fire safety team prioritize to effectively manage the fire while minimizing potential damage to the server room? -Activate the wet-pipe sprinkler system throughout the entire building. -Use portable Class A fire extinguishers to control the fire in the storage room. -Immediately release the clean agent fire suppression system in the server room. -Manually activate the pre-action sprinkler system in the storage room only.
-Use portable Class A fire extinguishers to control the fire in the storage room
191
The number of symbols that can be transmitted per second is called the _____The _____ is measured in hertz (or MHz or GHz).
baud rate.
192
is an average data transfer rate achieved over a period of time excluding encoding schemes, errors, and other losses incurred at the Physical and Data Link layers. can be adversely affected by link distance and by interference (noise).
Throughput
193
Speed is measured as a unit of time—typically milliseconds (ms)—and is also referred to as __, or delay.
latency
194
is the loss of signal strength, expressed in decibels (dB). dB expresses the ratio between two measurements; in this case, signal strength at origin and signal strength at destination.
Attenuation
195
(or noise) is anything that gets transmitted within or close to the channel that isn't the intended signal. This serves to make the signal itself difficult to distinguish, causing errors in data and forcing retransmissions. This is expressed as the signal to noise ratio (SNR).
Interference
196
device can be used to detect improper termination issues. the base unit is connected to one end of the cable and a remote unit to the other. When the test is activated, an LED for each wire conductor lights up in sequence. If an LED fails to light or does not light in sequence, there is a problem with the cable and/or termination.
wire map tester device
197
Wire map testers can identify the following problems:
Continuity (open) Short Incorrect pin-out/incorrect termination/mismatched standards Reversed pair Crossed pair (TX/RX transposed)
198
A conductor does not form a circuit because of cable damage or because the connector is not properly wired.
Continuity (open)
199
Two conductors are joined at some point, usually because the insulating wire is damaged, or a connector is poorly wired.
Short
200
The conductors are incorrectly wired into the terminals at one or both ends of the cable. The following transpositions are common:
Incorrect pin-out/incorrect termination/mismatched standards
201
The conductors in a pair have been wired to different terminals (for example, from pin 3 to pin 6 and pin 6 to pin 3 rather than pin 3 to pin 3 and pin 6 to pin 6).
Reversed pair
202
The conductors from one pair have been connected to pins belonging to a different pair (for example, from pins 3 and 6 to pins 1 and 2). This may be done deliberately to create a crossover cable, but such a cable would not be used to link a host to a switch.
Crossed pair (TX/RX transposed)
203
This is where both ends of a single wire in one pair are wired to terminals belonging to a different pair. This type of fault can only be detected by a cable tester that measures crosstalk.
split pair
204
may mean that the link experiences signal degradation problems with high error rates and retransmissions (frame or packet loss) resulting in reduced speeds and possibly loss of connectivity.
decibel (dB) loss (or insertion loss)
205
usually indicates a problem with bad wiring (poor quality or damaged or the improper type for the application), a bad connector, or improper termination. Crosstalk
Crosstalk
206
This measures crosstalk on the receive pairs at the transmitter end and is usually caused by excessive untwisting of pairs or faulty bonding of shielded elements.
Near End (NEXT)
207
This is the difference between insertion loss and NEXT. ACR is equivalent to a signal-to-noise ratio (SNR). A high value means that the signal is stronger than any noise present; a result closer to zero means the link is likely to be subject to high error rates.
Attenuation to Crosstalk Ratio, Near End (ACRN)
208
Far-end crosstalk (FEXT) is measured on the receive pairs at the recipient end. The difference between insertion loss and FEXT gives ACRF, which measures cable performance regardless of the actual link length.
Attenuation-to-Crosstalk Ratio, Far End (ACRF)
209
Gigabit and 10 GbE Ethernet use all four pairs. Power sum crosstalk calculations (PSNEXT, PSACRN, and PSACRF) confirm that a cable is suitable for this type of application. They are measured by energizing three of the four pairs in turn.
Power Sum
210
This is signal traffic from cables in close proximity that causes interference to a disturbed or victim cable. This is commonly caused by cinching a cable bundle with ties too tightly and by poorly terminated cabling.
Alien Crosstalk
211
Troubleshooting tool used to identify breaks or imperfections in fiber optic cable. The tool shines visible light down the cable and glows brightly at the point where a cable is broken, excessively bent, or improperly spliced.
visual fault locator
212
You are preparing to deploy a new fiber optic link that requires minimal signal loss and very low back-reflection due to the sensitivity of the connected equipment. Which type of connector polish should you ensure is used for this installation? -Ultra Physical Contact (UPC) -Physical Contact (PC) -Angled Physical Contact (APC) -Straight Physical Contact (SPC)
-Angled Physical Contact (APC) Angled Physical Contact (APC) is the correct answer. APC connectors are designed to minimize back-reflection (optical return loss) by angling the end of the fiber. This is crucial for applications requiring minimal signal loss and low back-reflection, making it the best choice for sensitive equipment.
213
What does Power Sum Crosstalk measure? -The total interference from all other cables in a bundle -Crosstalk on the transmit pairs at the receiver end -The suitability of a cable for Gigabit and 10 GbE Ethernet applications -The difference between insertion loss and Far End Crosstalk (FEXT)
-The suitability of a cable for Gigabit and 10 GbE Ethernet applications Power Sum Crosstalk calculations, including PSNEXT, PSACRN, and PSACRF, are used to confirm that a cable can adequately support applications like Gigabit and 10 GbE Ethernet, which utilize all four pairs of the cable.
214
During a routine network audit, a technician discovers that the ethernet cables running next to the electrical power lines are experiencing higher error rates than those routed separately. What is the most likely explanation for the increased error rates in these cables? -The ethernet cables are too long. -The proximity to power lines is causing increased Attenuation -The cables are experiencing Alien Crosstalk from the power lines. -The ethernet cables are of poor quality.
-The cables are experiencing Alien Crosstalk from the power lines. The cables are experiencing Alien Crosstalk from the power lines is the correct answer. While not traditional Alien Crosstalk as it involves electrical interference rather than signal traffic from other data cables, the principle is similar. The electromagnetic interference from the power lines can disrupt the signal in the ethernet cables, leading to higher error rates.
215
What is the maximum allowed insertion loss for Cat 5e at 100 MHz? 21.7 dB 24 dB 10 dB 30 dB
24 dB For Cat 5e cables at 100 MHz, the maximum allowed insertion loss is up to 24 dB. This value is specific to the cable category and frequency.
216
The transceiver component responsible for physically connecting a host to the transmission medium is implemented in a
network interface card/controller (NIC), also referred to as a network adapter
217
Each Ethernet network interface port has a unique hardware address known as the ______. is 48 bits long with the first half representing the manufacturer's organizationally unique identifier (OUI). Also called a client identifier. This may also be referred to as the Ethernet address (EA) or, in IEEE terminology, as the extended unique identifier (EUI). also referred to as a local or physical address.
Media Access Control (MAC) address.
218
________ transceivers use LC connectors and support Gigabit Ethernet data rates. Fiber optic transceiver module type supporting duplex 1 Gbps (SFP) or 10 Gbps (SFP+) links.
Small form-factor pluggable (SFP)
219
______ is a transceiver form factor that supports 4 x 1 Gbps links, typically aggregated to a single 4 Gbps channel. Fiber optic transceiver module type supporting four individual duplex lanes at 1 Gbps (QSFP) or 10 Gbps (QSFP+) that can be aggregated into a single 4 Gbps or 40 Gbps channel. QSFP+ is typically used with parallel fiber and multi-fiber push-on (MPO) termination. ______ + can also be used with Wavelength Division Multiplexing (WDM) Ethernet standards.
Quad small form-factor pluggable (QSFP)
220
Modular transceivers are designed to be used with a specific type of optical fiber. For example, transceivers designed for single mode fiber use ______ while multimode fiber transceivers use ____
laser diodes; LEDs or a different type of laser (VCSEL).
221
uses two strands for transmit (Tx) and receive (Rx).
Duplex
222
uses multiple strands (typically eight or twenty) to implement Tx and Rx channels.
Parallel
223
uses either a single bidirectional strand or dual unidirectional strands to implement multiple channels, distinguished by wavelengths.
Wavelength Division Multiplexing
224
Assessment of allowable signal loss over a fiber optic link. or loss budget, is the amount of loss suffered by all components along a fiber transmission path. This is calculated using the following parameters: Attenuation, connectors, and splices.
An optical link budget
225
This is the loss over the length of the cable, based on fiber type and the wavelength used. Single mode has a loss of up to 0.4 dB/km, while multimode can be from 0.8 dB/km to 3 dB/km.
Attenuation
226
Each connector in the path incurs a loss, usually assumed to be 0.75 dB.
Connectors
227
Additional splices in the cable are budgeted at around 1 dB for mechanical and 0.3 dB for fusion.
Splices
228
Ethernet encapsulates the payload from higher layer protocols within a protocol data unit (PDU) called a ___
frame.
229
basic format of an ethernet frame and ethernet header:
Preamble> SFD> Destination MAC > Source MAC> Ether Type> Payload > FCS
230
are used for clock synchronization and as part of the CSMA/CD protocol to identify collisions. _____ consists of 8 bytes of alternating 1s and 0s with the _______ being two consecutive 1s at the end. This is not technically considered to be part of the frame.
The preamble and start frame delimiter (SFD); The preamble; SFD
231
The 2-byte ___ field is usually used to indicate the type of protocol in the frame payload. For example, a frame carrying an IPv4 packet would have an _____ value of 0x0800; one carrying IPv6 data would be 0x86DD.
EtherType
232
The error checking field contains a 32-bit (4-byte) checksum called a ____. is calculated based on the contents of the frame; the receiving node performs the same calculation and, if it matches, accepts the frame. There is no mechanism for retransmission if damage is detected nor is the ___ completely accurate at detecting damage; these are functions of error checking in protocols operating at higher layers.
cyclic redundancy check (CRC) or frame check sequence (FCS).
233
The first six hex digits (3 bytes or octets), also known as the __________, identify the manufacturer of the adapter. The last six digits are a serial number.
organizationally unique identifier (OUI)
234
The IEEE gives each network adapter manufacturer a range of numbers, and the manufacturer hard codes every interface produced with a unique number from their range. the universal address
Burned-in Addresses
235
A packet addressed to a single host. If the host is not on the local subnet, the packet must be sent via one or more routers.
A unicast transmission
236
Network segment in which all nodes receive the same broadcast frames at layer 2.
broadcast domain.
237
Which optical wavelengths are typically supported by different transceivers? -650 nm, 850 nm, and 1300 nm -850 nm, 1300 nm, and 1550 nm -900 nm, 1200 nm, and 1600 nm -700 nm, 950 nm, and 1450 nm
-850 nm, 1300 nm, and 1550 nm Transceivers are designed to work at specific optical wavelengths to match the transmission characteristics of the optical fiber they are used with. The typical wavelengths supported are 850 nm, 1300 nm, and 1550 nm. These wavelengths are chosen based on their transmission properties, including minimal loss and dispersion over fiber optic cables.
238
Which type of laser is typically used with single mode fiber transceivers? -LED -VCSEL -Laser diodes -Incandescent bulbs
-Laser diodesSingle mode fiber transceivers typically use laser diodes because they can provide the narrow beam and high power necessary for the long-distance transmission that single mode fibers support. Laser diodes are capable of transmitting data over longer distances with less signal loss compared to LEDs or VCSELs, which are more commonly used with multimode fibers.
239
What is the function of duplex fiber deployment? -It uses a single strand for both transmit and receive. -It uses two strands for transmit (Tx) and receive (Rx). -It uses multiple strands to implement Tx and Rx channels. -It implements multiple channels distinguished by wavelengths
-It uses two strands for transmit (Tx) and receive (Rx).
240
Which of the following is a unique identifier for each Ethernet network interface port? -IP address -MAC address -Serial number -Model number
-MAC address Explanation: Each Ethernet network interface port has a unique hardware address known as the Media Access Control (MAC) address, which is used to identify devices on a network.
241
What is the primary purpose of a Multi-Source Agreement (MSA) in the context of modular transceivers? -To ensure compatibility between transceivers from different vendors -To increase the data transmission speed of transceivers -To decrease the cost of transceivers -To standardize the size of transceivers
-To ensure compatibility between transceivers from different vendors
242
Which type of connectors do SFP transceivers use? -RJ-45 -LC -SC -MPO
-LC Small Form Factor Pluggable (SFP) transceivers use LC connectors, which are designed for fiber optic cables.
243
A network administrator is configuring a new network interface card (NIC) for a server in a data center. The NIC has a default MAC address of 00:1A:2B:3C:4D:5E. However, due to specific network policies, the administrator needs to change this to a locally administered address. Which of the following addresses could the administrator use to comply with this policy? -02:1A:2B:3C:4D:5E -AA:BB:CC:DD:EE:FF -00:1A:2B:3C:4D:5F -FF:FF:FF:FF:FF:FF
-02:1A:2B:3C:4D:5E Changing the second least significant bit of the first byte to 1 (as in 02) indicates that the address is locally administered. This is the correct way to convert a universally administered address to a locally administered one.
244
What does a MAC address of ff:ff:ff:ff:ff:ff signify? -A unicast transmission -A multicast transmission -A broadcast transmission -An invalid MAC address
-A broadcast transmission A MAC address consisting entirely of 'ff:ff:ff:ff:ff:ff' is the broadcast address, meaning the frame should be processed by all nodes within the same broadcast domain.
245
_____ acts like a multiport repeater so that every port receives transmissions sent from any other port. As a repeater, the hub works only at the Physical layer.
A hub
246
The end system interface is referred to as ____; the interface on the hub is referred to as MDI crossover (MDIX). This means that the transmit (Tx) wires on the host connect to receive (Rx) wires on the hub.
medium dependent interface (MDI)
247
An Ethernet ____ works at the Data Link layer (layer 2) to establish separate physical network segments while keeping all nodes in the same logical network. This reduces the number of collisions caused by having too many nodes contending for access. builds a forwarding database to track which addresses are associated with which of its ports. When the bridge is initialized, the database's MAC address table is empty, but information is constantly added as the bridge listens to the connected segments.
bridge
248
An Ethernet ______ performs the same sort of function as a bridge, but in a more granular way and for many more ports than are supported by bridges. Each ____ port is a separate collision domain.
switch
249
Method of dividing networks to isolate workloads and the infrastructure that supports them from other workloads.In effect, the switch establishes a point to point full-duplex link between any two network nodes. This is referred to as ______
microsegmentation.
250
Ethernet switches can be distinguished using the following general categories:
unmanaged vs managed stackable modular vs fixed desktop vs rack mounted
251
switches are more likely to be _____, standalone units that can be added to the network and run without any configuration.
unmanaged
252
On a corporate network, switches are most likely to be ___. This means the switch settings can be configured. If a _____ switch is left unconfigured, it functions the same as an -____ switch does.
managed; unmanaged
253
Switches that can be connected together and operate as a group. The switch stack can be managed as a single unit.
Stackable
254
A _____ switch comes with a set number of ports that cannot be changed or upgraded.
fixed
255
A ______ switch has slots for plug-in cards, meaning it can be configured with different numbers and types of ports.
modular
256
Simple unmanaged switches with five or eight ports might be supplied as small freestanding units that can be placed on a _____
desktop.
257
Most larger switches are designed to be fitted to the standard-size racks that are used to hold networking equipment.
rack-mounted
258
Switch Interface Configuration: This is a read-only mode where commands can be used to run basic troubleshooting tools. This mode is indicated by the > prompt.
User EXEC mode
259
Switch Interface Configuration: This allows the user to report the configuration, show system status, reboot or shut down the appliance, and backup and restore the system configuration. This mode is activated using the enable command from user EXEC mode. It is denoted by a # prompt.
Privileged EXEC mode
260
Switch Interface Configuration: This allows the user to write configuration updates. It is activated by using the configure terminal command from privileged mode and indicated by a (config)# prompt.
Global configuration mode
261
What advantage does a stackable switch offer over a non-stackable -It cannot be managed as a single unit. -It offers fewer ports. -It allows for physical stacking only, without any management benefits. -It simplifies network management by allowing multiple switches to be managed as a single unit.
-It simplifies network management by allowing multiple switches to be managed as a single unit.
262
What command is used to enter the Global Configuration mode on a Cisco switch? -enable -configure terminal -interface GigabitEthernet0/1 -do copy running-config startup-config
-configure terminal The configure terminal command is used to enter the Global Configuration mode from the Privileged EXEC mode. This mode allows the user to make configuration updates to the device. The enable command is used to switch from User EXEC mode to Privileged EXEC mode, not to enter Global Configuration mode.
263
What is the role of the CSMA/CD protocol in a hub-based Ethernet network? -It encrypts data to prevent unauthorized access. -It assigns IP addresses to devices connected to the hub. -It manages the timing of data transmissions to avoid collisions. -It increases the data transmission speed of the hub.
-It manages the timing of data transmissions to avoid collisions. The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol is used in Ethernet networks to manage how devices on the same network segment transmit data. It allows devices to "listen" to the network to ensure no other device is transmitting (Carrier Sense). If the network is clear, a device can transmit. If two devices transmit simultaneously, a collision occurs. CSMA/CD then manages the retransmission attempts after random time delays to minimize the chance of repeated collisions. This protocol is crucial in hub-based networks, where all devices share the same collision domain.
264
What distinguishes a collision domain from a broadcast domain? -Collision domains are established by routers, while broadcast domains are established by switches. -Collision domains are about physically shared media, and their borders are established by bridges and switches. -Broadcast domains require a layer 2 broadcast address to be established. -Collision domains can span multiple routers, while broadcast domains are limited to a single switch.
-Collision domains are about physically shared media, and their borders are established by bridges and switches.
265
means combining two or more separate cabled links into a single logical channel. Combining the bandwidth of two or more switch ports into a single channel link. if one link is broken, the connection is still maintained by the other. It is also often cost-effective
Link aggregation
266
Two or more NIC aggregated into a single channel link for fault tolerance and increased throughput. Also known as NIC bonding.
NIC teaming
267
can be used to detect configuration errors and recover from the failure of one of the physical links. IEEE protocol governing the use of bonded Ethernet ports (NIC teaming). Also referred to as 802.3ad and 802.1ax.
Link Aggregation Control Protocol (LACP)
268
Link aggregation is typically implemented using the IEEE _______. 802.3ad bonded interfaces are described as a link aggregation group (LAG).
802.3ad/802.1ax standard; 802.3ad
269
A standard Ethernet frame has a maximum length of ___, excluding the preamble.
1,518 bytes
270
Each frame has an 18-byte header:
6-byte destination and source MAC address fields. 4-byte error checking field. 2-byte EtherType field.
271
Maximum size in bytes of a frame's payload. If the payload cannot be encapsulated within a single frame at the Data Link layer, it must be fragmented.
maximum transmission unit (MTU).
272
The maximum size of the data payload is ______
1,500 bytes
273
Ethernet frame with a payload larger than 1500 bytes (up to about 9000 bytes). it is critical that all hosts and appliances (switches and routers) along the communications path be able and configured to support them. support can be configured using the command mtu 9018
A jumbo frame
274
is a means for the bridges or switches to organize themselves into a hierarchy and block loops. Protocol that prevents layer 2 network loops by dynamically blocking switch ports as needed. The switch at the top of the hierarchy is the root. The switch with the lowest ID, comprising a priority value and the MAC address, will be selected as the root.
The Spanning Tree Protocol (STP)
275
In Spanning Tree Protocol (STP), the process and metrics that determine which bridge or switch will be identified as root. Selection of an inappropriate root device can cause performance and security issues. If a switch supports spanning tree, it should operate by default without configuration. An administrator can (and should) set the priority value to predetermine ________
root bridge selection.
276
Blocking
Forwards Frames? NO Learns MACs? NO Notes - the port drops all frames other than BPDUs
277
Listening
Forwards Frames? NO Learns MACs? NO Notes - The port is listening for BPDUs to detect loops
278
Learning
Forwards Frames? NO Learns MACs? YES Notes - The port discovers the topology of the network and builds the MAC address table
279
Forwarding
Forwards Frames? YES Learns MACs? YES Notes - The port works as normal
280
Disabled
Forwards Frames? NO Learns MACs? NO Notes - The port has been disabled by the administrator
281
is a means of supplying electrical power from a switch port over ordinary data cabling to a connected powered device (PD), such as a VoIP handset, IP camera, or wireless access point.
Power over Ethernet (PoE)
282
Power is supplied as 350mA@48V and limited to 15.4 W output. Given that some of this dissipates over the length of cable, it supports PDs that require up to about 13 W.
3af
283
Supplies at 30 W, with a maximum current of 600 mA. This can support PD requirements of up to about 25 W.
3at (PoE+)
284
Supplies at 60 W (Type 3) or 90 W (Type 4), with up to 51 W and 71 W usable power, respectively.
3bt (PoE++)
285
What happens when a Topology Change Notification (TCN) is received in a network using STP? -The network topology remains unchanged. -The root bridge is re-elected. -Ports may change their status from forwarding to blocked or vice versa. -All ports are set to the blocking state.
-Ports may change their status from forwarding to blocked or vice versa. When a TCN is received, it indicates that a device has been added or removed from the network. STP may then adjust the network topology by changing the status of ports (from forwarding to blocked or vice versa) to maintain a loop-free network.
286
Which command is used to designate a switch as the primary root bridge in Spanning Tree Protocol? -spanning-tree vlan 1 root primary -spanning-tree vlan 1 set root -spanning-tree vlan 1 primary root -spanning-tree vlan 1 root set primary
-spanning-tree vlan 1 root primary
287
What command is used to display the current Spanning Tree Protocol configuration on a Cisco switch? -show protocols spanning-tree -display spanning-tree status -show spanning-tree -view spanning-tree configuration
-show spanning-tree
288
Which of the following is a multicast frame that contains spanning tree protocol information about switch ports that allows switches to exchange information? Bus BPDU DPs Lowest ID
BPDU; The spanning tree protocol (STP) information gets packaged as bridge protocol data unit (BPDU) multicast frames. Each switch then determines the shortest path to the root bridge by exchanging information with other switches.
289
What happens if both sides of a link aggregation are set to passive mode? -A bonded channel is created with reduced bandwidth. -A bonded channel is created with increased latency. -No bonded channel is created. -The physical links are disabled.
-No bonded channel is created. When both sides of a link aggregation are set to passive mode, no bonded channel will be created because both sides are waiting for the other to initiate the LACP process. For a bonded channel to be established, at least one side must be in active mode.
290
Which of the following are components of the 18-byte header in a standard Ethernet frame? (Select four.) -Payload size indicator -Destination MAC address -Preamble -Error checking field -Source MAC address -EtherType field
-Destination MAC address -Error checking field -Source MAC address -EtherType field
291
Port Status Indicators: Solid green - Flickering green- No light - Blinking amber - solid amber-
Solid green—The link is connected, but there is no traffic. Flickering green—The link is operating normally (with traffic). The blink rate indicates the link speed. No light—The link is not working, or the port is shut down. Blinking amber—A fault has been detected (duplex mismatch, excessive collisions, or redundancy check errors, for instance). Solid amber—The port is blocked by the spanning tree algorithm, which works to prevent loops within a switched network.
292
lists the state of all interfaces or the specified interface. An interface has a line status (up if a host is connected via a good cable) and a protocol status (up if an Ethernet link is established). will also report configuration details and traffic statistics if the link is up/up.
show interface
293
_______ displays the switch's configuration. The startup configuration ( ____), which is configured on next boot, could be different from the running configuration ( _______). If there has been some undocumented change to the switch, using these commands and comparing the output may reveal the source of a problem.
show config ; show startup-config; show running-config
294
If an interface is not up/up, you need to diagnose the cause from the state: down/down - Administratively down/down - Down/error disabled - Up/down (suspended) -
Down/down—There is no link. This is typically because no host is attached, but it could also be caused by a speed mismatch. Administratively down/down—The interface has been disabled using the shutdowncommand. Use no shutdown to bring it up. Down/error disabled—The interface is disabled due to some error state. This is typically either a spanning tree or port security violation issue. Up/down (suspended)—The port is part of a link aggregation group, and the channel has not been negotiated. Use show etherchannel to investigate the cause. Both sides should use the same speed, duplex, and link control type, and use the same number of ports. When using LACP, at least one side must be active.
295
An interface might change rapidly or "flap" between up and down states, making the problem harder to observe and diagnose. Interface _______ record the number of events over time. This allows you to diagnose issues with an interface that is up but that is unreliable or performing poorly.
counters
296
Measures whether an interface is working (up) or not (down). You would configure an alert if an interface goes down so that it can be investigated immediately. You may also want to track the uptime or downtime percentage so that you can assess a link's reliability over time.
Link state
297
The number of times an interface has restarted over the counter period. Interfaces may be reset manually or could restart automatically if traffic volume is very high or a large number of errors are experienced. Anything but occasional resets should be closely monitored and investigated.
Resets
298
An interface may discard incoming and/or outgoing frames for several reasons, including checksum errors, mismatched MTUs, packets that are too small (runts) or too large (giants), high load, or permissions—the sender is not on the interface's access control list (ACL) or there is some sort of virtual LAN (VLAN) configuration problem, for instance. Each interface is likely to class the type of discard or drop separately to assist with troubleshooting the precise cause.
Discards/drops
299
______ is calculated by an interface when it sends a frame. A ___ value is calculated from the frame contents to derive a 32-bit value. This is added to the header as the frame check sequence. The receiving interface uses the same calculation. If it derives a different value, the frame is rejected. The number of ___ errors can be monitored per interface. errors are usually caused by interference.
A cyclic redundancy check (CRC)
300
A _____ is a frame that is smaller than the minimum size (64 bytes for Ethernet). A _______ is usually caused by a collision. In a switched environment, collisions should only be experienced on an interface connected to a legacy hub device and there is a duplex mismatch in the interface configuration (or possibly on a misconfigured link to a virtualization platform). If ____ are generated in other conditions, suspect a driver issue on the transmitting host.
runt frame
301
A _____ is a frame that is larger than the maximum permissible size (1518 bytes). There are two likely causes of giant frames:
giant Jumbo frames—A host might be configured to use jumbo frames, but the switch interface is not configured to receive them. This type of issue often occurs when configuring storage area networks (SANs) or links between SANs and data networks. The MTU value in the show interface output will indicate whether jumbo frames are accepted on a particular port. Ethernet trunks—A trunk link carries traffic between switches or between a switch and a router. Trunk links often use 802.1Q framing to carry virtual LAN (VLAN) information. If one switch interface is configured for 802.1Q framing, but the other is not, the frames will appear too large to the receiver, as 802.1Q adds 4 bytes to the header, making the maximum frame size 1522 bytes.
302
The address mapping for that port is cached in a MAC address table. The address table is implemented as _____, a special type of memory optimized for searching, rather than random access.
content addressable memory (CAM); Consequently, the MAC address table is often also referred to as the CAM table.
303
If a MAC address cannot be found in the MAC address table, then the switch acts like a hub and transmits the frame out of all the ports, except for the source port. This is referred to as ____
flooding.
304
Troubleshooting issue where layer 2 frames are forwarded between switches or bridges in an endless loop.
A network loop
305
Without intervention, this loop will continue indefinitely, causing a _____. will cause network utilization to go to near maximum capacity and the CPU utilization of the switches to jump to 80% or more. This makes the switched segment effectively unusable until the broadcast storm stops.
broadcast storm.
306
Cabling for PoE+ must be __ or better, but standards typically recommend the use of ___
Cat 5e; Cat 6A.
307
When configuring Power over Ethernet, the maximum amount of power available across all switchports.
power budget
308
Fields in a datagram used to identify source and destination IP addresses, protocol type, and other layer 3 properties. contains fields to manage the logical addressing and forwarding function.
The Internet Protocol (IP) header
309
In IPv4, the header contains
two fields for the 32-bit source and destination addresses, plus a number of other fields to support forwarding functions.
310
indicates the version of Internet Protocol in use (4)
The Version field
311
indicate the size of the header and the total packet size (including the payload).
the Length fields `
312
indicate a Transmission Control Protocol (TCP/6) segment or a User Datagram Protocol (UDP/17) datagram, which work at the Transport layer. The values assigned to protocol types, such as 6 for TCP and 17 for UDP, are managed by IANA.
For most packets, the IP protocol type value in the Protocol field
313
is used for status messaging and connectivity testing.
Internet Control Message Protocol (ICMP/1)
314
is used with multicasting.
Internet Group Messaging Protocol (IGMP/2)
315
is used to tunnel packets across an intermediate network. This is used (for example) in some virtual private network (VPN) implementations.
Generic Routing Encapsulation (GRE/47)
316
are used with the encrypted form of IP (IPSec).
Encapsulating Security Payload (ESP/50) and Authentication Header (AH/51)
317
are protocols used by routers to exchange information about paths to remote networks.
Enhanced Interior Gateway Routing Protocol (EIGRP/88) and Open Shortest Path First (OSPF/89)
318
Forwarding at layer 3 is referred to as
routing
319
forwarding at layer 2 is described as
switching.
320
Broadcast mechanism by which the hardware MAC address of an interface is matched to an IP address on a local network segment.
the Address Resolution Protocol (ARP)
321
When an IP host wants to send a packet to a single recipient, it uses a ______ packet, addressed to the IP address of the destination host.
unicast
322
One means of addressing multiple hosts is to perform a _______. can be performed by sending a packet to the network or subnet's broadcast address.
broadcast; he broadcast address is the last address in any IP network or subnet.
323
allows one host on the Internet (or private IP network) to send content to other hosts that have identified themselves as interested in receiving the originating host's content.
IP multicasting
324
Multicast packets are sent to a destination IP address from a special range configured for use with that multicast group. In IPv4, ________ is reserved for multicast addressing.
the range 224.0.0.0 through to 239.255.255.255
325
The intent to receive multicasts from a particular host is signaled by joining a multicast group. ______ is typically used to configure group memberships and IP addresses.
The Internet Group Management Protocol (IGMP)
326
means that a group of hosts is configured with the same IP address. When a router forwards a packet to an _____ group, it uses a prioritization algorithm and metrics to select the host that is "closest" (that will receive the packet and be able to process it the most quickly). This allows the service behind the IP address to be provisioned more quickly and reliably. It allows for load balancing and failover between the server hosts sharing the IP address.
anycast; There isn't an anycast address range. Hosts participating in an anycast group are configured with the same unicast address. Anycast forwarding is handled by routers, typically using a dynamic routing protocol, such as Border Gateway Protocol (BGP).
327
What is the function of the Protocol field in the IPv4 header? -Indicates the version of Internet Protocol in use -Specifies the type of data encapsulated in the payload -Indicates the size of the header -Specifies the total packet size
-Specifies the type of data encapsulated in the payload
328
has three hierarchical levels: a network ID, subnet ID, and host ID. To create logical subnets, bits from the host portion of the IP address must be allocated as a subnetwork address, rather than part of the host ID. Division of a single IP network into two or more smaller broadcast domains by using longer netmasks within the boundaries of the network. Also called a subnet mask.
Subnet addressing
329
octet mask bits: 1 2 3 4 5 6 7 8
Binary octet 1 = 10000000 2 = 11000000 3 = 11100000 4 = 11110000 5 = 11111000 6 = 11111100 7 = 11111110 8 = 11111111 Decimal Equivalent 1 = 128 2 = 192 3 = 224 4 = 240 5 = 248 6 = 252 7 = 254 8 = 255
330
host address range for a /24 network
1 through 254
331
host address range for a /28 network
1 > 14 17 > 30 33 > 46 49 > 62
332
In Linux, Ethernet interfaces are classically identified as ______, and so on, although some network packages now use different schemes, such as en prefixes.
eth0, eth1, eth2
333
What happens to the number of available host addresses when a bit is added to the subnet mask? -It doubles. -It remains the same. -It approximately halves. -It increases by a factor of four.
-It approximately halves. Each bit added to the subnet mask reduces the number of bits available for host addresses, approximately halving the number of available host addresses. This is because the subnet mask determines how many bits are used for the network portion versus the host portion of an IP address.
334
A network administrator wants to use a subnet mask containing 62 usable addresses. Which of the following subnet masks should the administrator use? -255.255.255.192 -255.255.255.240 -255.255.255.224 -255.255.255.128
-255.255.255.192
335
What can dynamic routing protocols allow routers to do? -Assign IP addresses dynamically. -Share information about known networks and possible paths. -Encrypt data packets for secure transmission. -Increase the speed of packet delivery.
-Share information about known networks and possible paths. Dynamic routing protocols enable routers to exchange information about network topologies and available routes, allowing them to dynamically adjust to changes and select optimal paths for packet forwarding.
336
A host has an address of 100.55.177.99/16. Which of the following is the broadcast address for the subnet? -255.255.0.0 -255.255.255.0 -100.55.255.255 -100.255.255.255
-100.55.255.255 The broadcast address for the subnet is the last address on the subnet. In this example, the address uses 16 bits in the subnet mask (255.255.0.0), meaning that the first two octets indicate the subnet address (100.55.0.0), and the last two octets are used for host addresses. The last possible address on this subnet is 100.55.255.255.
337
So far, we have considered IP network and subnet IDs that are defined by network masks. This is referred to as ______
classless addressing.
338
____ scheme was employed in the 1980s, before the use of netmasks to identify the network ID portion of an address was developed. ________ allocates a network ID based on the first octet of the IP address.
A classful addressing
339
____ network addresses support large numbers of hosts—over 16 million. However, there are only 126 _____ network addresses.
Class A
340
There are 16,000 _____ networks, each containing up to about 65,000 hosts.
Class B
341
_____ networks support only 254 hosts each, but there are over two million of them.
Class C
342
First Octet: 1-126
Class A Class A: 255.0.0.0 (/8)
343
First octet: 128-191
Class B Class B: 255.255.0.0 (/16)
344
First octet: 192-223
Class C Class C: 255.255.255.0 (/24)
345
is one that can establish a connection with other public IP networks and hosts over the Internet. The allocation of ______ is governed by IANA and administered by regional registries and ISPs.
public IP addresses
346
10.0.0.0 to 10.255.255.255
(Class A private address range).
347
172.16.0.0 to 172.31.255.255
(Class B private address range).
348
192.168.0.0 to 192.168.255.255
(Class C private address range).
349
Through a router configured with a single valid public IP address or a block of valid public IP addresses; the router translates between the private and public addresses using a process called ___
Network Address Translation (NAT)
350
Through a ______that fulfills requests for Internet resources on behalf of clients. The _______ itself must be configured with a public IP address on the external-facing interface.
proxy server
351
(224.0.0.0 through 239.255.255.255) are used for multicasting
Class D addresses
352
(240.0.0.0 through 255.255.255.255) are reserved for experimental use and testing.
Class E addresses
353
127.0.0.0 to 127.255.255.255 (or 127.0.0.0/8) IP address by which a host can address itself over any available interface. a special address typically used to check that TCP/IP is correctly installed on the local host.
loopback address
354
Used when a specific address is unknown. This is typically used as a source address by a client seeking a DHCP lease.
0.0.0/8
355
Used to broadcast to the local network when the local network address is not known.
255.255.255
356
Set aside for a variety of special purposes.
64.0.0/10, 192.0.0.0/24, 192.88.99.0/24, 198.18.0.0/15
357
Set aside for use in documentation and examples.
192.0.2.0/24, 198.51.100.0/24, 203.0.113.0/24
358
The following factors must be weighed when planning an IPv4 network addressing scheme:
The number of IP networks and subnetworks required must be considered. The number of hosts per subnet that must be supported must be considered. The network ID must be from a valid public or a private range (not from the loopback, link local reserved range, multicast range, or reserved/experimental range, for instance). The network and/or host IDs cannot be all 1s in binary—this is reserved for broadcasts. The network and/or host ID cannot be all 0s in binary; 0 means "this network." Each host ID must be unique on the IP network or subnet. The network ID must be unique on the Internet (if you are using a public addressing scheme) or on your internal system of internetworks (if you are using a private addressing scheme).
359
2^2 2^3 2^4 2^5 2^6 2^7 2^8
4 8 16 32 64 128 256
360
1 2 3 4 5 6 7 8
128 192 224 240 248 252 254 255
361
Using network prefixes to aggregate routes to multiple network blocks ("supernetting"). This replaced the old method of assigning class-based IP addresses based on the network size. uses bits normally assigned to the network ID to mask the complexity of the subnet and host addressing scheme within that network.
Classless Inter-Domain Routing (CIDR)
362
A complementary classless addressing technique, called _____ allows a network designer to allocate ranges of IP addresses to subnets that match the predicted need for numbers of subnets and hosts per subnet more closely. allows different length netmasks to be used within the same IP network, allowing more flexibility in the design process.
variable length subnet masking (VLSM),
363
Why is VLSM considered a complementary technique to supernetting? -Because it allows for the allocation of IP addresses to ISPs -Because it simplifies network design -Because it allows for more efficient IP address allocation -Because it increases the IPv4 address space
-Because it allows for more efficient IP address allocation VLSM complements supernetting by allowing for more efficient allocation of IP addresses within a network. While supernetting aggregates multiple IP networks into a larger one to simplify routing, VLSM provides the flexibility to allocate IP address ranges to subnets based on actual needs, reducing wastage.
364
What is the main advantage of using VLSM over traditional fixed-length subnet masking? -It simplifies the routing table. -It allows for the use of the same subnet mask throughout the network. -It reduces the number of wasted IP addresses. -It increases the total number of available IP addresses.
-It reduces the number of wasted IP addresses. The main advantage of VLSM is its ability to reduce IP address wastage by allowing subnets of different sizes within the same network. This flexibility ensures that each subnet gets just the right amount of IP addresses, minimizing unused addresses.
365
Which of the following IP address ranges or IP addresses is specifically set aside for use in documentation and examples? -172.16.0.0/12 -192.0.2.0/24 -224.0.0.0 through 239.255.255.255 -127.0.0.0 to 127.255.255.255
-192.0.2.0/24 The IP address range 192.0.2.0/24 is specifically reserved for use in documentation and examples. This helps avoid confusion and potential conflicts by ensuring that the examples provided in documentation do not accidentally correspond to real IP addresses in use on the Internet or within private networks. 224.0.0.0 through 239.255.255.255 is the IP address range reserved for multicasting, not for documentation and examples.127.0.0.0 to 127.255.255.255 is reserved for loopback addresses, which are used for internal testing and communication within the host, not for documentation and examples.
366
When subnetting the network address 172.30.0.0/16 to support 12 subnets, what is the new subnet mask in dotted decimal format? -255.255.255.0 -255.255.240.0 -255.255.248.0 -255.255.0.0
-255.255.240.0 To support 12 subnets, you round up to the nearest power of 2, which is 16. This requires 4 bits (2^4 = 16). Adding 4 bits to the default /16 mask results in a /20 mask, which in dotted decimal format is 255.255.240.0. 11110000 Here’s how that becomes 240: Each position has a value: 128 64 32 16 8 4 2 1 1 1 1 1 0 0 0 0 Add the 1s: 128 + 64 + 32 + 16 = 240 That’s where 240 comes from 🎯
367
77.8.5 130.0.9 190.250.10 220.89.44 Which of the following represents (in order) the IP address class of each listed IP address? -Class A, Class B, Class B, Class C -Class B, Class B, Class C, Class C -Class A, Class B, Class C, Class C -Class B, Class B, Class C, Class D -Class B, Class C, Class C, Class D
-Class A, Class B, Class B, Class C 1-126 = Class A 128-191 = Class B 192-223 = Class C 224-239 = Class D 240-255 = Class E
368
Which of the following IP addresses are Class C addresses? (Select two.) -192.15.5.55 -189.189.5.2 -223.16.5.0 -240.0.0.0 -125.166.11.0
-192.15.5.55 -223.16.5.0
369
How do routers external to the network utilize CIDR? -By using the /22 prefix to simplify routing and reduce the complexity of their routing tables -By encrypting data packets based on the CIDR notation -By assigning dynamic IP addresses to devices within the network -By directly managing the LAN's internal subnet configurations
-By using the /22 prefix to simplify routing and reduce the complexity of their routing tablesRouters external to the network use the /22 prefix (or other summarized prefixes provided by CIDR) to simplify routing. This approach allows these routers to treat multiple IP addresses as part of a single, larger network, thereby reducing the number of entries in their routing tables and simplifying the routing process. This is a key advantage of CIDR, as it helps in managing the scalability of Internet routing by reducing the overall complexity.
370
without any switches will display the IP address, subnet mask, and default gateway (router) for all network interfaces to which TCP/IP is bound.
ipconfig
371
displays complete TCP/IP configuration parameters for each interface, including whether the Dynamic Host Configuration Protocol (DHCP) is enabled for the interface and the interface's hardware (MAC) address.
ipconfig /all
372
forces a DHCP client to renew the lease it has for an IP address.
ipconfig /renew interface
373
releases the IP address obtained from a DHCP server so that the interface(s) will no longer have an IP address.
ipconfig /release interface
374
displays the Domain Name System (DNS) resolver cache.
ipconfig /displaydns
375
clears the DNS resolver cache.
ipconfig /flushdns
376
registers the host with a DNS server (if it supports dynamic updates).
ipconfig /registerdns
377
command is used to enable or disable an interface
The ip link set eth0 up|down
378
can be used to modify the IP address configuration
ip addr add|delete
379
is used by hosts to determine which MAC address is associated with an IP address on the local network. are sent as broadcasts. can generate considerable traffic on a network, which can reduce performance.
The Address Resolution Protocol (ARP)
380
can be used to perform functions related to the ARP table cache. You would use this to diagnose a suspected problem with local addressing and packet delivery.
The arp command
381
shows the ARP cache contents. You can use this with IPAddress to view the ARP cache for the specified interface only. The ARP cache will not necessarily contain the MAC addresses of every host on the local segment. There will be no cache entry if there has not been a recent exchange of frames.
arp -a (or arp -g
382
adds an entry to the ARP cache. Under Windows, MACAddress needs to be entered with hyphens between each hex byte.
arp -s IPAddress MACAddress
383
deletes all entries in the ARP cache; it can also be used with IPAddress to delete a single entry.
arp -d *
384
command shows entries in the local ARP cache (replacing the old arp command).
In Linux, the ip neigh
385
is used to report errors and send messages about the delivery of a packet. are generated under error conditions in most types of unicast traffic but not for broadcast or multicast packets. can also be used to test and troubleshoot connectivity issues on IP networks.
The Internet Control Message Protocol (ICMP)
386
IP header field is reduced by one every time a packet is forwarded by a router (referred to as a hop). output field in the ping command shows the value of the counter when the packet arrived at its destination.
The Time to Live (TTL) IP header
387
There is no routing information (that is, the local computer does not know how to get to that IP address). This might be caused by some sort of configuration error on the local host, such as an incorrect default gateway, by a loss of connectivity with a router, or by a routing configuration error.
ping Error Messaging - Destination host unreachable
388
The host is unavailable or cannot route a reply to your computer. Requests time out when the TTL is reduced to 0 because the packet is looping (because of a corrupted routing table), when congestion causes delays, or when a host does not respond.
ping Error Messaging - No reply (Request Timed Out.)
389
You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following would you use to view the default gateway information on the Linux server? -ipconfig -Telnet -route -dig
-route Use the route command on systems running Linux to view information on the TCP/IP configuration, including the default gateway.
390
What is the purpose of the ip -s link command? -To add or delete IP addresses -To enable or disable interfaces -To report interface statistics -To configure firewall rules
-To report interface statistics The ip -s link command is used to report interface statistics, such as the number of packets transmitted and received. The -s option stands for statistics, providing detailed information about network interface performance.
391
consists of two or three elements: the main header, which is a fixed length (unlike in IPv4), one or more optional extension headers, and the payload.
An IPv6 packet
392
ipv6 - Describes the packet’s priority.
Traffic Class
393
ipv6 - Used for quality of service (QoS) management, such as for real-time streams. This is set to 0 for packets not part of any delivery sequence or structure.
Flow Label
394
ipv6 - Indicates the length of the packet payload, up to a maximum of 64 KB; if the payload is bigger than that, this field is 0, and a special Jumbo Payload (4 GB) option is established.
Payload Length
395
ipv6 - Used to describe what the next extension header (if any) is, or where the actual payload begins.
Next Header
396
ipv6 - Replaces the TTL field in IPv4 but performs the same function.
Hop Limit
397
ipv6 - replace the Options field in IPv4
Extension headers; There are several predefined extension headers to cover functions such as fragmentation and reassembly, security (IPSec), source routing, and so on.
398
An IPv6 address is divided into two parts:
the first 64 bits are used as a network ID, while the second 64 bits designate a specific interface
399
IPv6 unicast addressing is _____; a ____ is a region of the network.
scope
400
______ provide the equivalent of public addressing schemes in IPv4, while link local schemes provide private addressing.
Global scopes
401
The parts of a global address are as follows:
The first 3 bits (001) indicate that the address is within the global scope. Most of the IPv6 address space is unused. The scope for globally unique unicast addressing occupies just 1/8th of the total address space. In hex, globally scoped unicast addresses will start with a 2 (0010 in binary) or 3 (0011). The next 45 bits are allocated in a hierarchical manner to regional registries and from them to ISPs and end users. The next 16 bits identify site-specific subnet addresses. The final 64 bits are the interface ID.
402
The 64-bit interface ID can be determined by using two techniques.
One is by using the interface's MAC address. In the second technique, referred to as privacy extensions, the client device uses a pseudorandom number for the interface ID.
403
As a MAC address is 48 bits, a translation mechanism allows driver software to create a 64-bit interface ID from these 48 bits. Formally, this is called an Extended Unique Identifier-64 (EUI-64). First, the digits fffe are added in the middle of the MAC address. Second, the first 8 bits, or 2 hex digits, are converted to binary, and the 7th bit (or U/L bit) is flipped (from 0 to 1 or 1 to 0).
One is by using the interface's MAC address. This is known as a MAC-derived address or interface identifier.
404
This is known as a temporary interface ID or token. There is some concern that using interface identifiers would allow a host to be identified and closely monitored when connecting to the Internet, and using a token mitigates this to some degree.
In the second technique, referred to as privacy extensions, the client device uses a pseudorandom number for the interface ID.
405
addresses span a single subnet (they are not forwarded by routers). IP addressing scheme used within the scope of a single broadcast domain only. start with a leading fe80, with the next 54 bits set to 0, and the last 64 bits are the interface ID.
Link local addresses
406
Parameter assigned by a host to distinguish ambiguous interface addresses within a link local scope. A link local address is also appended with a
zone index (or scope id) of the form %1 (Windows) or %eth0 (Linux).
407
The parts of a multicast address are subdivided as follows:
The first 8 bits indicate that the address is within the multicast scope (1111 1111 or ff). The next 4 bits are used to flag types of multicast if necessary; otherwise, they are set to 0. The next 4 bits determine the scope; for example, 1 is node-local (to all interfaces on the same node), and 2 is link local. The final 112 bits define multicast groups within that scope.
408
allows nodes to join a multicast group and discover whether members of a group are present on a local subnet.
The Multicast Listener Discovery (MLD) protocol
409
Broadcast addresses are not implemented in IPv6. Instead, hosts use an appropriate
multicast address for a given situation.
410
IPv6 replaces ARP with the ____; used to identify link local nodes.
Neighbor Discovery (ND) Protocol.
411
Each unicast address for an interface is configured with a corresponding solicited-node multicast address.
It has the prefix ff02::1:ff plus the last 24 bits of the unicast address.
412
hosts and routers can run both IPv4 and IPv6 simultaneously and communicate with devices configured with either type of address.
Dual stack
413
can be used to deliver IPv6 packets across an IPv4 network. means that IPv6 packets are inserted into IPv4 packets and routed over the IPv4 network to their destination. Routing decisions are based on the IPv4 address until the packets approach their destinations, at which point the IPv6 packets are stripped from their IPv4 carrier packets and forwarded according to IPv6 routing rules.
Tunneling
414
allows a wide variety of Network layer protocols to be encapsulated inside virtual point-to-point links. This protocol has the advantage that because it was originally designed for IPv4, it is considered a mature mechanism and can carry both v4 and v6 packets over an IPv4 network.
Another option for tunneling is Generic Routing Encapsulation (GRE)
415
This is a well-known process for rewriting network addresses as they pass routing boundaries. With _____, an IPv6 host addresses an IPv4 host using the prefix 64:ff9b::/96 plus the 32-bit IPv4 destination address. When the packet reaches the gateway router, it strips the prefix and forwards the packet using IPv4 headers. Replies from the IPv4 host are directed to the IPv6 host by tracking connections using Transport layer port numbers.
Network Address Translation (NAT); NAT64
416
Prefix - 2000::/3 Leading Hex characters - 2, 3
Global unicast
417
prefix - fe80::/10 Leading Hex characters - fe80
Link local unicast
418
Prefix - ff00::/8 Leading hex characters - ff
Multicast
419
prefix - ff02::/16 Leading hex characters - ff02::1 (all nodes), ff02::2 (all routers), ff02::1:2 (DHCP)
multicast (link local)
420
prefix - ff02::1:ff00:0/104 leading hex characters - ff02::1:ff
solicited-node
421
prefix - ::/128 leading hex characters - 0::0
unspecified
422
prefix - ::1/128 leading hex characters - ::1
Loopback
423
prefix - 2001:db8::/32 leading hex characters - 2001:db8
Documentation/examples
424
Globally unique unicast addresses are also widely referred to as __
/48s.
425
A host that has not obtained a valid address. This is often expressed as ::.
Unspecified address (0:0:0:0:0:0:0:0)
426
Used for testing (for the host to send a packet to itself). This is often expressed as ::1.
Loopback address (0:0:0:0:0:0:0:1)
427
Which of the following is true about the scope of IPv6 global unicast addresses? -They are equivalent to private IPv4 addresses. -They are not routable over the Internet. -They occupy 1/8th of the total IPv6 address space. -They are primarily used for broadcasting messages.
-They occupy 1/8th of the total IPv6 address space. IPv6 global unicast addresses are designed to be routable over the Internet and are equivalent to public IPv4 addresses. They occupy a relatively small portion of the total IPv6 address space, specifically 1/8th, indicating a vast amount of available addresses.
428
What does flipping the 7th bit of the first octet in a MAC address to form an EUI-64 address accomplish? -It indicates that the address is multicast. -It signifies that the address is now private. -It differentiates the modified address from the original MAC address. -It converts the address to a link-local address.
-It differentiates the modified address from the original MAC address.
429
What prefix do 6to4 addresses use? -64:ff9b::/96 -2002::/16 -3544::/16 -6RD::/16
-2002::/16 6to4 automatic tunneling uses the prefix 2002::/16 for its addresses. This method allows IPv6 packets to be sent over an IPv4 network without any host configuration necessary to enable the tunnel
430
What does the classless notation "/64" signify in an IPv6 network address? -The address is divided into 64 subnets. -The first 64 bits are reserved for the network prefix. -The first 64 bits specify the portion of 64 bits are the global routing prefix. -The last 64 bits are used for multicast addressing.
-The first 64 bits are reserved for the network prefix.
431
What do the first 8 bits of an IPv6 multicast address indicate? -The address is within the unicast scope. -The address is within the multicast scope. -The address is reserved for anycast addressing. -The address is used for Neighbor Discovery protocol.
-The address is within the multicast scope.
432
How does IPv6 anycast addressing differ from multicast addressing? -Anycast uses a single address for multiple interfaces globally. -Anycast allows a packet to be sent from multiple sources to a single interface. -Multicast sends a packet from a single source to a single interface. -Multicast uses a special range of addresses for routing protocols
-Anycast uses a single address for multiple interfaces globally.
433
What is the role of a zone index in IPv6 link local addressing? -To encrypt the address -To provide global routing information -To make the address unique to a particular link -To increase the address space:
-To make the address unique to a particular link; The zone index is used to distinguish between different links or interfaces on a single device, ensuring that the link local address is unique to each network interface.
434
What is the primary purpose of IPv6 link local addresses? -To provide global internet connectivity -To enable communication within a single subnet without the need for a router -To assign addresses for email servers -To encrypt data packets for secure communication
-To enable communication within a single subnet without the need for a router
435
Which of the following statements correctly describes the use of canonical notation in IPv6 addresses? -Canonical notation allows multiple contiguous series of zeros in an IPv6 address to be replaced by double colons (::). -Canonical notation permits the removal of all zeros in an IPv6 address, regardless of their position. -Canonical notation allows leading zeros in each 16-bit block of an IPv6 address to be ignored, and one contiguous series of zeros to be replaced by a double colon (::). -Canonical notation requires that all zeros in an IPv6 address be explicitly represented, without any compression.
-Canonical notation allows leading zeros in each 16-bit block of an IPv6 address to be ignored, and one contiguous series of zeros to be replaced by a double colon (::).
436
What is the prefix notation for globally unique unicast IPv6 addresses commonly referred to as? -/32 -/48 -/64 -/128
-/48 Globally unique unicast addresses in IPv6 are widely referred to as /48s. This notation indicates that the first 48 bits of the address are used for network identification, leaving the remaining bits for interface identification. This allows for a large number of unique addresses within a single network. The /32 prefix is typically used for IPv4 addresses and is not commonly associated with IPv6 globally unique unicast addresses. While /64 is a common subnet size for local networks in IPv6, it is not the prefix notation specifically used to refer to globally unique unicast addresses. The /128 prefix indicates a single IPv6 address, not a range of addresses, and is therefore not correct for globally unique unicast addresses.
437
If the address configuration on the local host seems to be correct, you can complete a series of connectivity tests using ping to determine the likely location and scope of a fault.
Ping the loopback address ( ping 127.0.0.1) to verify TCP/IP is installed and loaded correctly. If this fails, reinstall the network protocol stack. Ping the IP address of the local host to verify it was added correctly and to verify that the network adapter is functioning properly. If you cannot ping the host's own address, there might have been a configuration error, or the network adapter or adapter driver could be faulty. Ping the IP address of the default gateway to verify it is up and running and that you can communicate with another host on the local network. Ping the IP address of other hosts on the same subnet to test for local configuration or link problems. If a local host cannot be pinged and the error is destination unreachable, then verify the IP configuration does not contain an incorrect IP address or netmask. If these are correct but pings still time out, suspect either a security issue (such as a switch port security issue) or a problem at the Data Link or Physical layer. Ping the IP address of a remote host to verify you can communicate through the router. If a remote IP address cannot be contacted, check the default gateway parameter on the local host to rule out an incorrect default gateway issue. If the gateway is configured correctly and you can ping the router, you need to start investigating the routing infrastructure.
438
The following main parameters define a routing entry:
Protocol Destination Interface Gateway/next hop
439
The source of the route. Paths can be configured statically or learned by exchanging information with other routers via a dynamic routing protocol.
Protocol
440
Routes can be defined to specific hosts but are more generally directed to network IDs. The most specific (longest) destination prefix will be selected as the forwarding path if there is more than one match.
Destination
441
The local interface to use to forward a packet along the chosen route. This might be represented as the IP address of the interface or as a layer 2 interface ID.
Interface
442
The IP address of the next router along the path to the destination.
Gateway/next hop
443
Routing table entries fall into four general categories:
Directly connected routes Remote routes Host routes Default route
444
For subnets for which the router has a local interface. The IP network or subnet for each active router interface is automatically added to the routing table. These are known as
Directly connected routes
445
For subnets and IP networks that are not directly attached.
Remote routes
446
To a specific IP address. A host route has a /32 (IPv4) or /128 (IPv6) prefix.
Host routes
447
To use when an exact match for a network or host route is not found. Entry in the routing table to represent the fowarding path that will be used if no other entries are matched.
Default route
448
_______ is manually added to the routing table and only changes if edited by the administrator. Configuring static routing entries can be useful in some circumstances, but it can be problematic if the routing topology changes often, as each route on each affected router needs to be updated manually. can be configured either as non-persistent or persistent/permanent. is a special type of static route that identifies the next hop router for a destination that cannot be matched by another routing table entry. The destination address 0.0.0.0/0 (IPv4) or ::/0 (IPv6) is used to represent the
A static route; The default route is also described as the gateway of last resort.
449
route is removed from the routing table if the router is rebooted.
. A non-persistent
450
the router uses ARP (IPv4) or Neighbor Discovery (ND in IPv6) to determine the Data Link layer address of the destination interface.
If the packet can be delivered to a directly connected network via an Ethernet interface
451
it inserts the next hop router's MAC address as the destination address in a new frame and uses the MAC address of the outgoing interface as the source address.
If the packet can be forwarded via a gateway over an Ethernet interface
452
the router encapsulates the packet in an appropriate frame type.
If the packet can be forwarded via a gateway over another type of interface (leased line or DSL, for instance),
453
the packet is either forwarded via the default route or dropped (and the source host is notified that it was undeliverable).
If the destination address cannot be matched to a route entry,
454
At each router, the ____ header field is decreased by at least 1. This could be greater if the router is congested. The ___ is nominally the number of seconds a packet can stay on the network before being discarded. While ___ is defined as a unit of time (seconds), in practice, it is interpreted as a maximum hop count. When the ___ is 0, the packet is discarded. This prevents badly addressed packets from permanently circulating the network.
Time to Live (TTL)
455
Mechanism for splitting a layer 3 datagram between multiple frames to fit the maximum transmission unit (MTU) of the underlying Data Link network.
IP fragmentation.
456
will output the active routing table. As well as destination, gateway, AD/metric, and interface, the output will show the source of the route, identified as a letter code (C = connected, S = static, R = RIP, B = BGP, D = EIGRP, O = OSPF, and so on). Command tools used in router operating systems to list the contents of routing tables.
The show route, show ip route, show ipv6 route, or similar show route command
457
As with any IP host, a router keeps a cache of IP addresses that have been resolved to MAC addresses via the Address Resolution Protocol (ARP). Inspecting the ARP cache table is useful for discovering duplicate IP addresses, IP misconfigurations, and routing protocol misconfigurations. To view the cache, use
show arp or show ip arp.
458
is used to view and modify the routing table of end system Windows and Linux hosts. Cross-platform command tools used display and manage the routing table on a Windows or Linux host.
The route command
459
tool allows you to test the whole path between two nodes with a view to isolating the node or link that is causing the problem. Diagnostic utilities that trace the route taken by a packet as it "hops" to the destination host on a remote network. tracert is the Windows implementation, while traceroute runs on Linux.
The traceroute
460
What is the default probe message type used by the tracert command on Windows systems? -ICMP Echo Request -TCP SYN -UDP -ARP Request
The tracert command on Windows systems uses ICMP Echo Request probes by default to trace the path to a target host. This method helps in identifying the route and diagnosing any issues along the path.
461
Which command outputs the active routing table and includes details such as destination, gateway, and the source of the route? -show route -route print -ip route show -show arp
-show route The show route command is used on routers to output the active routing table, including comprehensive details such as destination, gateway, AD/metric, interface, and the source of the route, identified by letter codes. The show route command is used on routers to output the active routing table, including comprehensive details such as destination, gateway, AD/metric, interface, and the source of the route, identified by letter codes. The route print command is specific to Windows hosts and, while it does show the routing table, it is not the command that provides the detailed output described, especially regarding the source of the route. The ip route show Linux command displays the routing table but the question specifically describes the output format typical of router commands like show route. The show arp command is used to view the ARP cache, not the routing table, and does not provide information on destinations, gateways, or route sources.
462
What does the Time to Live (TTL) header field represent in a packet? -The maximum number of routers the packet can pass through -The maximum distance the packet can travel -The maximum time the packet can exist on the network -The priority assigned to the packet for data transmission
-The maximum number of routers the packet can pass through
463
How does IPv6 handle packet fragmentation differently from IPv4? -IPv6 allows routers to perform fragmentation. -IPv6 requires the host to perform path MTU discovery. -IPv6 increases the MTU to avoid fragmentation. -IPv6 uses a different header field for fragmentation management.
-IPv6 requires the host to perform path MTU discovery.
464
uses an algorithm and metrics to build and maintain a routing information base. Entry in the routing table that has been learned from another router via a ________. Also called a learned route.
A dynamic routing protocol
465
______ is one that was communicated to a router by another router. A router can add _____ from one or more routing protocols to its IP routing table.
A learned route
466
Most algorithms are classed as either ______. Some protocols use a hybrid of different methods to perform path selection more efficiently.
distance vector or as link state
467
Algorithm used by routing protocols that select a forwarding path based on the next hop router with the lowest hop count to the destination network.
distance vector
468
Algorithm used by routing protocols that build a complete network topology to use to select optimum forwarding paths.
link state
469
is the process whereby routers running dynamic routing algorithms agree on the network topology. Routers must be capable of adapting to changes such as newly added networks, router or router interface failures, link failures, and so on. Process whereby routers agree on routes through the network to establish the same network topology in their routing tables (steady state). The time taken to reach steady state is a measure of a routing protocol's convergence performance.
Convergence
470
_______ means that a packet is discarded without notification back to the source; a loop causes a packet to be forwarded around the network until its TTL expires.
A sinkhole
471
A network where all the routers share the same topology is described as ______
steady state
472
A network under the administrative control of a single owner is referred to as an __
autonomous system (AS).
473
_____ is one that identifies routes within an AS.
An Interior Gateway Protocol (IGP)
474
___________is one that can advertise routes between autonomous systems. includes a field to communicate the network's autonomous system ID and allows network owners to determine whether they can use paths through another organization's network.
An Exterior Gateway Protocol (EGP)
475
is a distance vector routing protocol. only considers a single piece of information about the network topology—the next hop router to reach a given network or subnet (vector). It considers only one metric to select the optimal path to a given destination network—the one with the lowest hop count (distance). is no longer widely deployed, it is useful to review how it works to help to understand the function of more advanced and widely used protocols.
The Routing Information Protocol (RIP)
476
________ was developed by Cisco to provide a routing protocol for routing within a domain or autonomous system.
The Interior Gateway Routing Protocol (IGRP)
477
Limitations in IGRP, such as lack of support for classless addressing, led to the development of _______. is a distance vector protocol because it relies on neighboring routers to report paths to remote networks. Unlike RIP, which is based on a simple hop count metric, ____ uses a metric composed of administrator weighted elements. The two default elements are bandwidth and delay. maintains a topology table alongside its routing information base. is a default IP protocol, which means that it is encapsulated directly in IP datagrams, rather than using TCP or UDP. also uses hello messaging, which confirms connectivity with its neighbors. It is also tagged with the protocol number 88 in the Protocol field of the IP header. Updates are transmitted using multicast addressing.
Enhanced IGRP (EIGRP)
478
Applies a cost based on the lowest bandwidth link in the path.
Bandwidth
479
Applies a cost based on the time it takes for a packet to traverse the link. This metric is most important if the route is used to carry time-sensitive data, such as voice or video. Delay is calculated as the cumulative value for all outgoing interfaces in the path.
Delay
480
Dynamic routing protocol that uses a link-state algorithm and a hierarchical topology. is suited to large organizations with multiple redundant paths between networks. is hierarchical.
Open Shortest Path First (OSPF)
481
is designed to be used between routing domains in a mesh internetwork and as such is used as the routing protocol on the Internet, primarily between ISPs. Path vector exterior gateway routing protocol used principally by ISPs to establish routing between autonomous systems. works over TCP on port 179.
The Border Gateway Protocol (BGP)
482
If a router has multiple entries to similar networks in its routing table, it must determine which route to prefer. The first determining factor is that _____ are preferred over shorter ones. This is referred to as _____
longer prefixes; longest prefix match.
483
Metric determining the trustworthiness of routes derived from different routing protocols. is used to express the relative trustworthiness of the protocol supplying the route.are coded into the router but can be adjusted by the administrator if necessary.
administrative distance (AD) value. Local interface/Directly connected - 0 Static route - 1 BGP - 20 EIGRP - 90 OSPF - 110 RIP - 120 Unknown - 255
484
What can cause convergence problems in a dynamic routing network? -A stable network with no changes -A flapping interface -Consistent routing information across all routers -The use of static routing protocols
-A flapping interface; A flapping interface, which frequently changes its state from up to down and back again, can cause convergence problems. This is because each state change can trigger the routers to recalculate routes, leading to instability and inconsistent routing information across the network.
485
If a router has two routes to the same destination with identical prefix lengths, within the same routing protocol, how does it choose which route to use? -By selecting the route with the largest packet size -By choosing the route with the lowest metric -By preferring the route with the shortest prefix -By using the Administrative Distance (AD) value
-By choosing the route with the lowest metric
486
______ placed at the network perimeter, are typified by distinguishing external (Internet-facing) and internal interfaces. can perform framing to repackage data from the private LAN frame format to the WAN Internet access frame format.
Edge routers,
487
The customer's router is referred to as _______
the customer edge (CE)
488
the service provider's router is referred to as _____
the provider edge (PE).
489
is primarily deployed as a service translating between a private (or local) addressing scheme used by hosts on the LAN and a public (or global) addressing scheme used by an Internet-facing device. Routing mechanism that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-routable addresses internally.
Network Address Translation (NAT)
490
Maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications.
Port Address Translation (PAT); This can be referred to as Network Address Port Translation (NAPT), NAT overloading, one-to-many NAT, many-to-one NAT, or NAT masquerade.
491
Which of the following problems does NAT help address? -The shortage of IPv4 addresses -Registering IP addresses with an ISP -The shortage of IPv6 addresses -IPsec not working properly
-The shortage of IPv4 addresses
492
The basic function of a firewall is _____. The firewall processes traffic according to rules. Traffic that does not conform to a rule is blocked.
traffic filtering.
493
_____ is configured by specifying rules in a network access control list (ACL). Each rule defines a specific type of data packet and the appropriate action to take when a packet matches the rule. An action can be either to deny (block or drop the packet, and optionally log an event) or to accept (let the packet pass through the firewall). works at layer 3 of the OSI model to inspect the headers of IP packets.
A packet filtering firewall
494
Accepting or denying traffic based on its source and/or destination IP address.
IP Filtering
495
Accepting or denying a packet based on source and destination Transport layer port numbers.
Port Filtering/Security
496
This means that rules can be based on the information found in those headers:
IP filtering Protocol ID/type (TCP, UDP, ICMP, routing protocols, and so on). Port filtering/security
497
This means that it does not preserve information about the connection between two hosts. Each packet is analyzed independently with no record of previously processed packets. This type of filtering requires the least processing effort, but it can be vulnerable to attacks that are spread over a sequence of packets
A packet filtering firewall is stateless.
498
addresses these problems by maintaining stateful information about the session established between two hosts (including malicious attempts to start a bogus session). Information about each session is stored in a dynamically updated state table. operates at layer 5 (Session) of the OSI model. When a packet arrives, the firewall checks it to confirm whether it belongs to an existing connection. If it does not, it applies the ordinary packet filtering rules to determine whether to allow it.
A circuit-level stateful inspection firewall
499
is a stand-alone hardware firewall that performs only the function of a firewall.The functions of the firewall are implemented on the appliance firmware. This is also a type of network-based firewall and monitors all traffic passing into and out of a network segment.
An appliance firewall
500
similar to an appliance firewall; the functionality is built into the router firmware.
A router firewall
501
establishes how nodes are physically and logically connected. Recall that the basic topologies are as follows: point-to-point, star, mesh
network topology
502
is anything that uses a mixture of point-to-point, star, and mesh physical and/or logical topologies. often used to implement redundancy and fault tolerance or to connect sites in WANs and in enterprise campus networks:
A hybrid topology
503
Corporate networks are often designed in a hierarchy, also known as a tree topology. This can be combined with a star topology to implement each node in the overall tree. The links between nodes in the tree are referred to as backbones or trunks because they aggregate and distribute traffic from multiple different areas of the network.
Hierarchical star
504
Alternatively, nodes at the top of the hierarchy can be configured in a partial or full mesh for redundancy. Switches or routers lower in the hierarchy establish star topologies that connect end systems to the network.
Hierarchical Star-mesh
505
A WAN might be configured as a hub and spoke between a central office and branch offices, with each site implementing a star topology to connect end systems. This is also referred to as a snowflake topology.
Star of stars
506
Paradigm to simplify network design by separating switch and router functionality and placement into three tiers each with a separate role, performance requirements, and physical topology. access, distribution, and core.
three-tiered hierarchy
507
allows end user devices, such as computers, printers, and smartphones to connect to the network. is implemented for each site using structured cabling and wall ports for wired access and access points for wireless access. Lowest tier in a hierarchical network topology acting as the attachment point for end systems.
Access/Edge Layer
508
provides fault-tolerant interconnections between different access blocks and either the core or other distribution blocks. Intermediate tier in a hierarchical network topology providing interconnections between the access layer and the core. often used to implement traffic policies, such as routing boundaries, filtering, or quality of service (QoS).
The distribution or aggregation layer
509
Switch appliance capable of IP routing between virtual LAN (VLAN) subnets using hardware-optimized path selection and forwarding. used to implement the distribution/aggregation layer have different capabilities to the layer 2 workgroup switches used in the access tier.
The layer 3 capable switches
510
While a router uses a generic processor and firmware to process incoming packets, a layer 3 switch uses an ______
application-specific integrated circuit (ASIC)
511
provides a highly available network backbone. Devices such as client and server computers should not be attached directly to the core. Its purpose should be kept simple: provide redundant traffic paths for data to continue to flow around the access and distribution layers of the network.
The core layer
512
a monolithic core layer is implemented as a full mesh. This is impractical if there are large numbers of core switches, making the design less scalable. Two-tier hierarchical network topology where access layer switches connect directly to a full mesh core layer.
collapsed core model
513
A logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a ____ ID. Even though hosts on two ______s may be physically connected to the same switch, local traffic is isolated to each ____, so they must use a router to communicate.
virtual LANs (VLANs)
514
is the process of logically dividing an IP network into smaller subnetworks (subnets), with each subnet having a unique address.
At layer 3, subnetting
515
The interconnections between switches are referred to as ___. Backbone link established between switches and routers to transport frames for multiple virtual LANs (VLANs).
trunks.
516
VIDs are normally defined by the ________
IEEE 802.1Q standard.
517
An untagged/access port uses the following port tagging logic:
If a frame is addressed to a port in the same VLAN on the same switch, no tag needs to be added to the frame. If the frame needs to be transported over a trunk link, the switch adds the relevant 802.1Q tag to identify the VLAN, and then forwards the frame over the trunk port.
518
transmits voice traffic as data packets, rather than over circuit-based transmission lines.
Voice over IP (VoIP)
519
The VLAN with ID 1 is referred to as the ______
default VLAN
520
Unless configured differently, all ports on a switch default to being in _____
VLAN 1
521
is one into which any untagged traffic is put when receiving frames over a trunk port. VLAN ID used for any untagged frames received on a trunk port. The same ID should be used on both ends of the trunk and the ID should not be left as the default VLAN ID (1). When a switch receives an untagged frame over a trunk, it assigns the frame to the native VLAN. Untagged traffic might derive from legacy devices such as hubs or older switches that do not support 802.1Q encapsulated frames.
A native VLAN
522
Configuring a router's physical interface with multiple virtual interfaces connected to separate virtual LAN (VLAN) IDs over a trunk.
Subinterfaces
523
Feature of layer 3 switches that allows a virtual interface assigned with an IP address to act as the default gateway for a VLAN. With layer 3 switches, each VLAN can be assigned a _________ to act as the default gateway.
Switch Virtual Interface (SVI)
524
What is the primary difference between tagged and untagged ports regarding VLAN tags? -Tagged ports add a VLAN tag to all outgoing frames. -Untagged ports can transport traffic for multiple VLANs. -Tagged ports strip VLAN tags from incoming frames. -Untagged ports do not add or remove VLAN tags from frames within the same VLAN.
-Untagged ports do not add or remove VLAN tags from frames within the same VLAN.
525
A network administrator wants to set up a switch with a voice or auxiliary Virtual Local Area Network (VLAN) to distinguish the PC and VoIP traffic without having to set up a trunk port. Which of the following commands should the administrator perform first? -interface GigabitEthernet0/0 -switchport mode access -switchport access vlan 100 -switchport voice vlan 101
-interface GigabitEthernet0/0
526
Why is it recommended to change the native VLAN from its default setting? -To allow for more VLANs to be created -To reduce the risk of VLAN hopping attacks -To increase the speed of the network -To enable inter-VLAN routing
-To reduce the risk of VLAN hopping attacks
527
may arise because a required static routing entry has not been entered or has been entered incorrectly. may also arise because a router fails to communicate with its neighbors and so does not receive routing protocol updates. Troubleshooting issue where a routing table does not contain a required entry due either to manual misconfiguration or failure of a dynamic routing protocol update.
A missing route
528
Troubleshooting issue where a packet is forwarded between routers in a loop until its TTL expires. occurs when two routers use one another as the path to a network.
A routing loop; One symptom of a potential routing loop is for routers to generate ICMP Time Exceeded error messages.
529
If the cost exceeds a certain value (16 in RIP), the network is deemed unreachable. A poison route is one advertised with a hop count of 16. This can provide an explicit failure notice to other routers.
Maximum hop count
530
If a node declares a network unreachable, its neighbors start a holddown timer. Any updates about that route received from other nodes are discarded for the duration of the timer. This is designed to ensure that all nodes have converged information about an unreachable network.
Holddown timer
531
Prevents a routing update from being copied back to the source. In the example above, this would prevent Router C from sending an update about a route to Router A via Router B to Router B.
Split horizon
532
Routing protocols use various mechanisms to prevent loops. For example, distance vector protocols use the following mechanisms:
Maximum hop count holddown timer split horizon
533
If you can ping a host's default gateway but cannot ping hosts on remote networks, what should you suspect? -A DNS issue -A routing issue -A firewall issue -A cable disconnection
-A routing issue; possibly due to a router going offline or a misconfiguration.
534
What is the effect of a poison route in distance vector routing protocols? -It increases the hop count to the maximum to speed up convergence. -It advertises a route with a hop count of 16 to indicate the network is reachable. -It advertises a route with a hop count of 16 to indicate the network is unreachable. -It decreases the hop count to zero to indicate the network is directly connected.
-It advertises a route with a hop count of 16 to indicate the network is unreachable. A poison route is advertised with a hop count set to the maximum (e.g., 16 in RIP) to explicitly notify other routers that the network is unreachable, helping to prevent routing loops. Increasing the hop count to the maximum does not speed up convergence; it indicates unreachability.
535