Networking Flashcards

(149 cards)

1
Q

When a key network administrator leaves a company, which of the following does the company depend on to continue to use the network?

A

Network documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the most common central device used today to connect computers to a network?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the most common adapter or connector used to connect a computer to a wired network?

A

Rj-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is used by a switch for increased performance ?

A

Full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is used to isolate a group of computer within an organization?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is used to create VLANs?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which zone is used to publish external websites for an organization?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which topology is the most redundant and the most expensive?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following standards describe CSMA/CD ?

A

802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which mechanism is used by wireless networks to access the network ?

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which model promises the most processing power?

A

Distributive computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which model uses a central database for authentication?

A

Client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A river directory runs which of the following types of servers ?

A

Network controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In which model does a each host have its own security database?

A

Peer to peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of communication is sent to a single designated host?

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is used to uniquely identify a host on a tcp/ip network ?

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the central device used in wireless LANs?

A

Wireless access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _________ is a single computer device that connects to a TCP/IP network.

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which mode is used to describe how data communication occurs between hosts?

A

OSI reference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which layer in the OSI model do MAC addresses and switches use?

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which layer in the OSI model covers routing between networks ?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which layer in the OSI model covers http, ftp, and RDC?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which layer of the OSI model is used to create a connection so that a host can transfer files?

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which layer of the OSI mode includes VLANs?

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which protocol is used as the transport protocol for a video application?
UDP
26
Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?
Well-known ports
27
Which layer in the OSI model is responsible for logging on and off?
Session
28
Which layer in the OSI mode is used to encrypt data
Presentation
29
Which layer in the OSI model includes the cable and network adapters ?
Physical
30
How many layers does the tcp/ip model have ?
4
31
Which layer in the OSI model is included in the TCP/IP model?
Transport
32
Which ports are defined above 49,151?
Dynamic ports
33
A layer 3 switch is similar to a ______
Router
34
TCP/IP and IPX/SPX are known as _________ stacks.
Protocol
35
Describe the advantage of using UDP over TCP
UDP has less overhead, which allows for faster performance
36
Which of the following the most common cable used today?
UTP
37
If you are making a crossover cable and one end is 568A, which of the following should be the other end?
568B
38
If you want to connect a computer directly to another computer without using a switch, you should use which of the following?
Crossover cable
39
You need to connect a twisted pair cable to the back of a patch pane. Which of the following tools should be used?
Punch down tool
40
Which of the following is the minimum category of twisted pair cable necessary to support 100 mbps ?
Category 5
41
When you pick up your wireless phone, your computer drops network connectivity. Which of the following could be the cause of the problem?
(RFI) Radio frequency interference
42
You are setting up a network within a warehouse using category 6 UTP. However, parts of the network are down because of the heavy machinery used. Which cable type should be used?
Fiber
43
Which of the following terms is defined as electrical signAls jumping to another set of wires?
Crosstalk
44
Which type of cable should be used as part of a fire code for a building?
Plenum rated
45
Which of the following is not a fiber connector ?
RJ-45
46
Which of the following is a characteristic of single mode fiber?
Single mode fiber supports longer distances than multi mode fiber
47
Which of the following is the maximum speed supported by 802.11b?
11 mbps
48
Which of the following is the maximum speed supported by 802.11g?
54 mbps
49
Which of the following is not a characteristic of 802.11n?
RFI protection
50
Which of the following is the most secure encryption used in wireless networks?
WPA2
51
Which of the following used to identify a wireless network ?
SSID
52
An ____ is used to test a cable.
Continuity tester
53
________ occurs when a signal degraded as it runs through a wire
Attenuation
54
For organizations, using ________ authentication for wireless networks is recommended
802.1x
55
Which of the following is the default subnet mask for a class B network?
255.255.0.0
56
You manage a host with the address of 180.24.45.120. To which of the following classes will this be address be assigned ?
Class B
57
For IPv4, which class is used for multi casting?
Class D
58
Which of the following is the maximum number of hosts you can use for each subnet that belongs to a Class c address?
254
59
Which type of address is 202.23.2.255?
Broadcast address
60
Which type of address is used to send a single set of packets to multiple hosts?
Multi cast address
61
Which of the following is not a private address?
200.23.34.120
62
Which type of address is 169.254.32.23?
APIPA
63
You manage a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of 169.32.54.2. Which of the following statements best describes the issue?
The host cannot find a DHCP server
64
Which of the following defines the nearest router for a host?
Default gateway
65
Which server is used to translate host names to IP addresses?
DNS
66
Which of the following used to remap private addresses to public addresses and back?
NAT
67
Which of the following terms is used to describe a smaller network that is part of a larger network?
Subnet
68
In a subnet mask of 255.255.240.0, which of the following is the CIDR notation?
/20
69
How many Bits is an IPv6 address?
128
70
Which type of address is 2001:4212:0000:34DB:0000:0000:0000:4231?
IPv6
71
A ____________ address is assigned by DHCP server
Dynamic
72
The loop back address is__________.
127.0.0.1
73
Which command displays the IP address, subnet mask, and default gateway of the system you are currently on?
Ipconfig
74
Which protocol is used by the ping command to test network connectivity?
ICMP
75
Which command is used to clear the dns cache on a local system ?
Ipconfig/flushdns
76
Which command is used to test a systems IPv4 protocol stack ?
Ping 127.0.0.1
77
Which command is used to display active TCP or UDP connections ?
Netstat
78
Which command is used to display NETbios over tcp/IP statistics?
Netstat
79
Which command clears the NETBIOS name cache table?
Nbtstat- R
80
Which command tests network connectivity while showing you each hop all the way?
Tracert
81
Which command tests network connectivity while showing you each hop along the way and the degree of packet loss?
Path ping
82
Which command is used to connect to a FTP server to download file?
FTP
83
Which command is used to connect to a remote computer so that you can execute commands ?
Telnet
84
Which command is used to connect to a mail server so that you can test SMTP?
Telnet
85
Which command is used to display and modify the network configuration of a local computer?
Netsh
86
Which command is used to add static routes to a windows computer?
Route
87
________ displays the routing table on a local system
Local print
88
___________ displays the MAC address on a system.
Ipconfig/all
89
________retrieved or updated your DHCP assigned configuration.
Ipconfig/renew
90
_____________ registers the computers name and IP address with the nearest DNS server.
Ipconfig/registerdns
91
_________ displays Ethernet statistics.
Netstat -e
92
Which protocol automatically configured IP configuration for a client?
DHCP
93
Which of the following ports are used by DHCP?
67
94
After you install DHCP server and configure and activate a scope, which of the following is the last step in installing a DHCP server?
Authorize the server
95
You manage a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. Which of the following best describes the problem?
The computer can not communicate with DHCP server
96
Beginning with windows server 2008 R2, terminal services was renamed to which of the following ?
Remote Desktop services
97
Which port is used by Remote Desktop services ?
3389
98
Which of the following is a network service in Windows servers, including windows server 2012, windows server 2012 R2 and windows server 2016?
Microsoft RRAS routing and remote access service
99
Which protocol ok is used with L2TP to encrypt data ?
IPSec Internet protocol security
100
Which component of IPSec generates encryption and authentication keys ?
SA security association
101
Which IPSec component provides connectionless integrity and data authentication but does not provide confidentiality?
AH Authentication header
102
Which IPSec component provides the highest level of security, including confidentiality?
ESP Encapsulating security payload provides the same services as ah But also provides confidentiality when sending data.
103
Which port used by DNS?
53
104
Which service on a windows network is used to translate between NETbios names/computer names and IP addresses?
WINS
105
Which feature within windows allows the server to act as a router ?
IP forwarding
106
The ________ is used to connect to a terminal server.
Remote Desktop connection
107
_____________ provides name resolution between domain names and IP addresses.
DNS
108
________ allows a user to connect to a corporate network using the internet.
VPN
109
Which command reacquires IP configuration from a DHCP server?
Ipconfig/renew
110
List the four steps a client uses to get an IP address from a DHCP server
1. Discovery 2. Offering 3. Request 4. Acknowledge
111
Which routing protocol is the most popular distance- vector routing algorithm used to determine the best routes within a network?
RIP routing information protocol
112
Which routing protocol is the most popular link state protocol used within a large organization?
OSPF open shortest path first
113
Which technology breaks data into packets and sends it over a network, sometimes using different routes for each packet ?
Packet switching
114
X.25 and frame relay are examples of what type of WAN technology?
Packet switching
115
Which device acts as high speed modem for a LAN?
CSU/DSU
116
Which of the following is used by X.25 as its DTE device?
PAD
117
Which part the network is the point at which responsibility of the administrator ends and the telecommunications providers responsibility begins?
Demarc
118
Which of the following statements best describes a characteristic of X.25?
All of the above X.25 is a synchronous, digital transmission. X.25 features full error and flow control X.25 is considered legacy technology, which has been replaced by Less complex and faster technologies
119
When a packet traverses a network, each other router is a ________
Hop
120
When multiple circuits are connected to a site, the entire circuit is known as a________.
Virtual circuit
121
Which of the following replaced x.25?
Frame relay
122
At which of the following speeds does a T3 line run?
44.7 mbps
123
In Europe, which circuit is similar to the T1 found in the United States ?
E1
124
How many B channels are supported by an ISDN PRI?
23
125
Which speed is used by FDDI?
100 mbps
126
Which topology is used by FDDI?
Ring
127
Which of the following is used to ensure that time sensitive packets are delivered promptly?
Quality of service
128
Which technology uses wired from the telephone company to provide broadband internet connection ?
DSL
129
______ is used to send packets from one network to another network.
Routing
130
A __________ is a route that must be manually defined on each router.
Static route
131
Which type of network can you set up so that your company can work securely with another organization that is separate from or lateral to your company ?
Extranet
132
Which technology can you use temporarily to connect networks from two different companies ?
VPN
133
Which VPN technology is the most common and the easiest to set up?
PPTP Point to point tunneling protocol
134
Which port is used by L2TP
1723
135
Which type of firewall blocks packets based on files that are based on IP addresses or ports?
Packet filtering
136
Which technology used in firewalls keeps tracks of conversations so that it knows what to allow back into a network?
Stateful packet inspection
137
Which of the following acts as middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future?
Proxy server
138
Which type of device used to detect malicious network activities and reports only those issues to the administrator?
NIDS Network intrusion detection system
139
Which type of device is designed to inspect traffic, detect malicious activities and take steps to mitigate the malicious activity?
NIPS Network intrusion prevention system
140
Which DMZ configuration uses on firewall with three interfaces?
Three-Leg perimeter configuration
141
At which stage is the World Wide Web in?
2.0
142
Which protocol is used with L2TP to provide encryption?
IPSec
143
Which type of fire all works on the session layer that creates a connection and allows packets to flow between the two hosts without further checking?
Circuit level gateway
144
Which type of firewall used to block access to certain websites or instant messengers?
Internet content filter
145
When trying to protect your network, you should create your secure network based on __________
Layers
146
The ____________ is the largest WAN in the world.
Internet
147
An ________is the internal network for an organization.
Intranet
148
Which port is used by PPTP?
1723
149
Which device is used to protect one network from another by using filter packets ?
Firewall