Semester Exam Flashcards

(100 cards)

1
Q

To reduce fire hazards, most city ordinances require the use of __________ cable for network installations.

A

plenum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of cable works best for long-distance transmissions?

A

Fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which topology provides fault tolerance?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common use of coaxial cable in networking today?

A

Connecting a cable modem to an Internet Service Provider (ISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which IEEE committee sets the standards for networking?

A

IEEE 802

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many layers does the OSI model contain?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which connector is used for UTP cabling on a network?

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a broadcast MAC address?

A

FF-FF-FF-FF-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?

A

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which TCP/IP model layer uses connection-oriented protocols?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the maximum speed at which 10BaseT Ethernet networks communicate?

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of cabling does the 10BaseFL standard specify?

A

Fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What basis do bridges use to determine whether to forward traffic?

A

MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An Ethernet network using an Ethernet switch minimizes or avoids which events?

A

Collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of fiber-optic cabling and connectors does a 100BaseFX network use?

A

Multimode with ST or SC connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Including the preamble, how many basic pieces of information does an Ethernet frame contain?

A

Seven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What information would be included in the data portion of an Ethernet frame on an IP network?

A

The IP addresses of the sending and receiving systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the maximum cable length on a segment of a 1000BaseT network?

A

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How many pins does an RJ-45 connector have?

A

Eight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the most common connector used in a 1000BaseSX network?

A

LC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which switch and network equipment modular connectors have replaced gigabit interface converters (GBICs) as the modular connector of choice?

A

Small form-factor pluggable (SFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which standard specifies multimode cabling?

A

10BaseFL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an acceptable maximum collision rate on a properly running Ethernet network?

A

Ten percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What command would you run from a Windows command line to test a computer’s network stack?
ping 127.0.0.1
26
Which characteristic applies to stranded core cabling?
Stranded core contains a bundle of tiny wire strands.
27
To what layer of the OSI model does the TCP/IP model’s Internet layer correspond?
Network
28
Which protocol is connection-oriented?
TCP
29
Which port is used to receive e-mail messages from e-mail servers (POP3)?
110
30
How many binary digits are in an IPv4 address?
32
31
How long is a subnet mask?
32 bits
32
If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?
Class B
33
Which unit is used to measure signal loss in networking?
Decibel (dB)
34
What is the maximum number of hosts you may have on a network if the first decimal value of the IP address is between 192 and 223 and the subnet mask is 255.255.255.0?
254
35
What type of connector is used by all UTP Ethernet NICs?
RJ-45
36
What is the default subnet mask for a Class C network?
255.255.255.0
37
Suppose your network subnet mask is 255.255.0.0. What is the maximum number of host IDs available for this network?
65,534
38
Which NIC light turns on when the card detects network traffic and intermittently flickers when operating properly?
Activity light
39
Which subnet mask is an example of classless subnetting?
255.255.240.0
40
Which tool automatically assigns an IP address whenever a computer connects to the network?
DHCP
41
What is the range of decimal values in each of the four groups of an IPv4 address?
0 to 255
42
What is the norm today for the number of pairs in UTP cabling?
Four
43
Which protocol uses TCP as its transport layer protocol?
HTTP
44
What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?
90 meters
45
Which condition specifically applies to UTP cabling?
Electromagnetic interference
46
What are you trying to discover when you test a cable for continuity?
A broken wire
47
Which task is performed by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers?
Classless Inter-Domain Routing (CIDR)
48
The decimal value 151 converts to what binary value?
10010111
49
Which of the following is a designated private IP address?
10.164.19.5
50
Which port do Web servers use?
80
51
Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?
Dynamic NAT
52
Which type of port has a number in the 1024 to 49151 range?
Registered port
53
Which term refers to ports in the 49152 to 65535 range?
Dynamic port
54
Which column in a routing table tells the router which of its ports to use?
Interface
55
Two computers first acknowledges the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process?
Connection-oriented
56
Which protocol is by far the most common type of session on a typical TCP/IP network?
TCP
57
On a TCP/IP network, a router determines where an incoming packet should go by looking at the packet’s __________.
destination IP addresses
58
At which layer of the OSI model do routers work?
Network
59
Which form of NAT typically handles the one-to-many connections?
Port Address Translation (PAT)
60
What name is given to the port numbers in the range of 0 to 1023?
Well-known port numbers
61
Your company has a single server on the private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?
Port forwarding
62
__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.
Static NAT
63
Which term refers to the passage of a packet through a router?
Hop
64
Which term refers to another name for a session?
Connection
65
Which routing metric refers to the ability of a connection to handle more data than others?
Bandwidth
66
Which term defines a number used by the operating system to track all the running programs?
Process ID (PID)
67
Google Chrome and Mozilla Firefox are examples of __________ applications.
Web client
68
Which protocol enables you to control a remote computer from a local computer over a network?
Telnet
69
Which protocol is used to send e-mail over TCP port 25 and is used by clients to send messages?
SMTP
70
What is the name of the proprietary cable designed by Cisco for connecting to their routers?
Yost
71
Which tool records the route between any two hosts on a network and can be used to troubleshoot routing problems?
traceroute
72
Which of the following was developed as a secure replacement for Telnet?
Secure Shell (SSH
73
Which organization has the authority to create new top-level domain names?
ICANN
74
Which layer of the OSI model is a common place for encryption using proprietary encryption devices?
Layer 2
75
Which term refers to a standardized type of digital signature that includes the digital signature of a third party?
Certificate
76
In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?
Host.domain.root
77
Which authentication method is the most common authentication method for dial-up connections?
MS-CHAPv2
78
Within the DNS hierarchy, which term refers to the DNS servers just below the DNS root?
Top-level domain servers
79
Which type of encryption is the most popular form of e-mail encryption?
Public-key cryptography
80
Which term describes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?
Hash
81
Which characters are not permitted in a DNS domain or host name?
Spaces
82
Which term defines what an authenticated person can do with data?
Authorization
83
What term best describes the way the DNS name space is organized?
Hierarchical
84
What UDP port do DNS servers primarily use?
53
85
Which type of algorithm is used when two different keys are used in encryption?
Asymmetric-key
86
Which zone files are the most important part of any DNS server?
Forward lookup zones
87
Which organization is the biggest player in the certificate authority market?
VeriSign
88
What enables a system to determine an FQDN by knowing the IP address?
Reverse lookup zones
89
Which authentication method is the most popular form of authentication used in wireless networks today?
EAP-PSK (Personal Shared Key)
90
EAP is not a protocol in the classic sense, but rather, it is a PPP __________ that EAP-compliant applications can use to accept one of many types of authentication.
wrapper
91
In comparing the DNS name space to a computer’s file system, a domain is like __________.
a folder
92
Which protocol is the tool programs use to query and change a database used by the network?
LDAP
93
How is the address 127.0.0.1 listed in the hosts file?
localhost
94
Which term refers to the result of running cleartext through a cipher algorithm using a key?
Ciphertext
95
Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?
Active Directory
96
Which block cipher is used by most TCP/IP applications?
Advanced Encryption Standard (AES)
97
What potential problem does a browser look for after it receives a certificate from a secure HTTP site?
Revoked certificate
98
Which term describes an SSH-enabled program?
Secure Copy Protocol (SCP)
99
Which of the following would confirm that you have a DNS problem?
Ping works with the IP address but not with the Web site name.
100
Which term refers to a cipher’s underlying mathematical formula?
Algorithm