Sybex Network+ Flashcards

1
Q

What three elements must computers have in common to form a network?

A

Network media and topology, protocol, software client or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False:

There is no real difference between a logical network topology and a physical network topology.

A

False.
Logical topology describes traffic flow, and physical topology is how the computers are physically connected to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The most common topology in use today is the _____

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False:

Computers in a star topology use T connectors to attach the computer’s network card to the cable.

A

False.
Star topologies use a hub or a switch, and computers connected to them commonly use RJ-45 connectors (for twisted pair cabling).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False:

WEP is now considered to be a secure standard for wireless networking.

A

False.

WPA2 is the most secure standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A wireless access point (WAP) in an organization that was not installed by the administration team of that organization is referred to

A

rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False:

A mesh topology offers fault tolerance through redundant routes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A fully meshed topology with five components would have

A

20, 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is a term that refers to combining authentication, authorization, and accounting into the same system or sever.

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False:

Telnet is much more secure than SSH

A

False.

SSH is more secure than Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:

100BASE-TX Ethernet can send a signal 10 times as far as 10BASE-T Ethernet without the use of repeaters.

A

False.

It can send it 10 times as fast but not 10 times as far.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False:

Social engineering attacks rely on human nature more than on technical expertise.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of cable would you use to connect a CSU/DSU to another CSU/DSU?

A

T1 crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Original (legacy) Ethernet uses a carrier access method referred to as _____

A

CSMA/CD (carrier sense multiple access with collision detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The networking technology that defines standards for controlling data and that is defined by the IEEE 802.3 standard is ________

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False:

EIGRP is a link state routing protocol

A

False.

EIGRP is an advanced distance vector routing protocol that is also referred to as a hybrid routing protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or False:

Wireless networks operating at the 802.11b standard can operate at 11Mbps or 54Mbps.

A

False.

802.11b has a maximum operational speed of 11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or False:

Wireless networks using the 802.11b standard use a carrier access method of CSMA/CD.

A

False.

Wireless networks using the 802.11b/g/n standard use CSMA/CA, not CSMA/CD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False:

The 10G cable standard can transmit up to 10 million bits per second, but no higher.

A

False.

The 10G standard transmits at 10Gbps, or 10 billion bits per second!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False:

RJ-11 connectors are the most common type of connector used to connect routers, switches, and hubs

A

False.

RJ-45 connectors are the most common for routers, switches, and hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RJ-45 connectors can contain up to pairs of wires

A

four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The unique ID that an administrator can assign to a WAP is called the.

A

SSID (Service Set Identification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ST and SC are both type of connectors

A

fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RIP and RIPv2 are both routing protocols.

A

distance vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
True or False: | Shielded twisted-pair (STP) cable eliminates crosstalk and is the most common cable in use today.
False. | Shielded twisted-pair (STP) is used to reduce electromagnetic interference (EMI).
26
True or False: | The signal on a coaxial cable is divided between the inner core wire and the outer braided wire.
False. | All of the signal on a coaxial cable is in the core wire. The outer wire mesh is for grounding and shielding.
27
_______-mode fiber is used for very high speed, very high distance network applications
Single
28
True or False: | Switching loops can be prevented by the effective use of VTP
False. | Switching loops can be prevented by the effective use of spanning tree protocol (STP).
29
A switch controls and segments traffic on your network by learning the addresses of all of the components connected to it.
MAC (media access control)
30
True or False: | Switches can be used to create virtual local area networks (VLANs) that can further segment traffic on a network.
True
31
An _________ is a system that can detect malicious traffic and close ports or reset connections.
Intrusion Prevention System (IPS)
32
True or False: | Routers are devices that forward traffic from one network to another network using tables
True
33
A ________ is used to convert LAN signals to WAN signals, and vice versa.
CSU/DSU
34
True or False: | One of the jobs of a NIC is to translate digital data into analog data, and vice versa.
False. | NICs translate parallel data to serial data, not analog to digital.
35
OSPF is an example of a _______ routing protocol
link state
36
What frequency do 802.11g wireless devices use to connect to a WAP?
2.4GHz
37
True or False: | An F-connector is a type of copper connector that is commonly used with coaxial cable
True
38
Any device that receives data, converts it, and then sends it to another location can be called a.
transceiver
39
True or False: | Firewalls can be programmed to filter data packets based on the information that is contained in the packets.
True
40
A type of light that we cannot see but that is often used for communication and control is ________ light.
Infrared
41
________ is a short-range radio technology that is often used for wireless printers, mice, keyboards, and scanners.
Bluetooth
42
True or False: | A 900MHz wireless phone can interfere with wireless devices using 802.11g/n.
False. 802.11g/n use the 2.4GHz and 5GHz bands.
43
A ________ is used to connect computers using wireless NICs to a wired network
WAP (wireless access point)
44
True or False: | The 802.11b wireless standard requires line of sight with the networked devices
False. | 802.11 signals are radio signals that do not require line of sight.
45
In the MAC address 00-05-1B-00-4B-F6, which part of the address is the unique ID for the device?
00-4B-F6
46
True or False: | The MAC address is also referred to as a physical address.
True
47
The ________ is considered the highest layer in the OSI model.
Application, Layer 7
48
At the ________ layer of the OSI model, data is compressed (or decompressed) and encrypted or (decrypted).
Presentation, Layer 6
49
The ________ layer of the OSI model is responsible for establishing, synchronizing, maintaining, and then terminating the communication channels between computers.
Session
50
The Data Link layer is further subdivided into two other layers called ________
Logical Link Control, Media Access Control
51
True or False: The Presentation layer defines the physical characteristics of the network, such as the type of cable that must be used as well as the voltage that will be used to transmit data through the network.
False. The Presentation layer does not define the physical characteristics; the Physical layer does. The Presentation layer provides for coding and decoding for interpretation of data as it is forwarded to and from the Application layer.
52
True or False: | Switches use IP address tables to forward data traffic
False. | Switches use MAC addresses tables, not IP address tables.
53
The two protocols at the Transport layer of the TCP/IP protocol suite ________
TCP, UDP
54
True or False: | Routers operate at layer 3, the Network layer, of the OSI model.
True
55
A WAP operates at the ________ layer of the OSI model.
Physical
56
________ is a secure remote access and remote control system developed by Cisco.
TACACS+
57
________ is a type a system that translates one set of addresses to another on a one-to-one basis.
NAT (network address translation)
58
________ is a type of DSL that provides the same upload speed as its download speed.
SDSL (symmetric digital subscriber line)
59
True or False: | OSPF and IS-IS are distance vector routing protocol.
False. | OSPF and IS-IS are both link-state routing protocols
60
True or False: | Transport Layer Security (TLS) is gradually replacing SSL for secure Internet commerce.
True
61
IP addresses can be automatically assigned to clients in a network using special servers ________ servers.
Dynamic Host Configuration Protocol (DHCP)
62
Whereas IPv4 addresses are formatted in dotted decimal, IPv6 addresses are formatted in ________
hexadecimal
63
How many bits make up an IPv6 address?
128
64
The classful IP address 139.2.1.2 is a Class ________.
B
65
The classful IP address 200.200.200.200 is a Class ________ address.
C
66
True or False: The IP address 127.0.0.1 is generally considered an acceptable address to use for a network host.
False. 127.0.0.1 is the local loopback address used to test the TCP/IP stack for functionality. In fact, 127.x.x.x should not be used as the entire 127 network is reserved for diagnostics.
67
The default subnet mask for a Class B network is ________
255.255.0.0
68
True or False: | In subnetting, borrowing 3 bits from hosts to form networks allows the creation of 10 additional networks.
False. Borrowing three bits will create only 8 subnets (2^3), not 10.
69
How many networks can be created by borrowing 4 bits from hosts?
16
70
True or False: | The only addresses that will function at all on a private network are those in the recognized private IP address ranges.
False. Other addresses will function, but they are not recommended because the firewalls between your network will not have the proper configuration to block those addresses from being seen by other companies and therefore could cause conflicts.
71
The address 192.168.2.1 with a subnet mask of 255.255.255.0 could be a host address in a private network
True
72
True or False: It's usually considered proper and easier to assign static IP addresses to all clients on a network, rather than using automatic assignmen.
False. | It's easier and more accurate to use DHCP to provide automatic assignment for clients on a TCP/IP network.
73
True or False: | All router interfaces should be assigned a static address rather than use an automatically assigned address.
True
74
A ________ server is used to resolve hostnames to IP addresses.
DNS
75
True or False: | The address 169.254.1.1 with a default Class B subnet mask is an APIPA.
True
76
True or False: A newly installed Windows 7 client is automatically configured to obtain an address from a DHCP server if one is available.
True
77
IP is a connectionless protocol that works at the ________ layer of the OSI model.
Network
78
TCP is a connection-oriented protocol that works at the ________ layer of the OSI model.
Transport
79
True or False: | UDP is a connection-oriented protocol that works at the Transport layer.
False. | UDP does work at the Transport layer, but it is a connectionless protocol.
80
True or False: | FTP is the most secure protocol used to transfer files from one computer to another.
False. | FTP is not a secure protocol and there are file transfer protocols that are secure, such as SFTP.
81
TFTP is a connectionless protocol that works at the ________ layer of the OSI model.
Application
82
True or False: | SMTP is a protocol used to store email messages on a server.
False. | SMTP is a protocol that is used to send email.
83
SMTP works at the ________ layer of the OSI model.
Application
84
True or False: | HTTP is a secure protocol typically used for Internet commerce.
False. | HTTP is not a secure protocol and is typically not used for Internet commerce; HTTPS is used.
85
________ is one of the protocols used to retrieve mail from SMTP servers.
POP3 or IMAPv4
86
True or False: | With IMAPv4, you can read, store, and manage your email without downloading it.
True
87
True or False: | Telnet is a secure remote desktop protocol
False. | Telnet is not inherently secure and is rarely used in security conscious environments. SSH is used instead.
88
True or False: | SSH is a secure protocol used to manage computers remotely.
True
89
ICMP is a protocol that works at the ________ layer of the OSI model
Network
90
You can test general connectivity between computers using the ________ tool.
ping
91
The ping tool creates special packets called ________ packets.
Echo request
92
The IP address 127.0.0.1 is referred to as the ________ address.
loopback
93
The ________ tool works like the ping tool, but it can be used to determine which router is not able to forward a packet.
tracert
94
True or False: | RG-6 coaxial cable has less resistance than RG-58 due to its thinner core wire.
False. | RG-6 has less resistance than RG-58 due to its thicker core wire.
95
True or False: | The IP address of a computer must be unique to the local network.
True
96
True or False: | The hostname of a computer must only be unique within its own hierarchy of names.
True
97
True or False: | The ipconfig /all command displays all of the NetBIOS names of a computer.
False. The ipconfig /all command displays the IP address, subnet mask, default gateway, and addresses of DNS servers, DHCP servers, and so on; but it does not display NetBIOS information. The nbtstat command does.
98
True or False: | The ipconfig command displays the IP addresses configured for DNS servers and WINS servers.
False. | You must type ipconfig /all to obtain the addresses of DNS and WINS servers
99
The ________ command displays the NetBIOS name cache showing recently resolved NetBIOS names and IP addresses.
nbtstat
100
True or False: | VPN remote connectivity is inherently much faster than dial-up remote connectivity.
False
101
True or False: | ARP is a connectionless protocol that works at the Transport layer of the OSI model.
False. Address Resolution Protocol (ARP) is a connectionless protocol that works between the Network and Data Link layers of the OSI model.
102
ARP resolves IP addresses to ________ addresses.
MAC
103
NTP is an Application layer protocol that synchronizes ________ between computers on a network.
time
104
A DNS record that is the same as an A record but is specifically used on IPv6 is an
AAAA record
105
________ is the protocol that has become the standard for information directories such as Microsoft Active Directory.
Lightweight Directory Access Protocol (LDAP)
106
________ is the protocol standard used for multicasting on intranets.
IGMP
107
________ was developed along with WPA2 keys, used in wireless authentication.
Advanced Encryption Standard (AES)
108
True or False: | TCP port 8080 is considered a well-known port.
False. | Well-known ports range from 0-1023; 8080 is a registered port.
109
Registered ports range from 1024 to ________
49151
110
Domain Name System (DNS) resolves ________ to IP addresses.
hostnames
111
________ is a service that translates one set of addresses to another set of addresses.
network address translation (NAT)
112
True or False: | EIGRP is considered to be a hybrid routing protocol.
True
113
________ is a management protocol that you can use to gather information about the network and the components it contains.
simple network management protocol (SNMP)
114
True or False: | OSPF is considered to be a hybrid routing protocol.
False. | OSPF is strictly a link-state routing protocol and is not considered to be a hybrid.
115
________ is a technology whereby each packet of data can take a separate route to its destination.
Packet switching
116
________ is a technology whereby a single channel is opened at the start of a session and that single channel is used throughout the communication.
Circuit switching
117
A DNS record that indicates a mail server is an ________ record.
MX (mail exchange)
118
A T-1 line is a dedicated line that can carry up to ________ on 24 separate channels.
1.544Mbps
119
In the acronym ASDL, when referring to a digital subscriber line, the letter A stands for ______ .
asymmetric
120
True or False: | Broadband cable currently offers data rates of 10Mbps or even higher.
True
121
True or False: | SNMPv2 is actually more secure than SNMPv3.
False. | SNMPv3 was developed in part to be more secure than SNMPv2.
122
A ________ is a secure connection that is transmitted through a nonsecure medium, usually the Internet.
VPN (virtual private network)
123
________ is the protocol on which Microsoft Terminal Services operates.
RDP (remote desktop protocol
124
________ is a flexible protocol that can be used to secure practically all TCP/IP related communication.
IPSec
125
True or False: | All computer clients support the L2TP tunneling protocol.
False. | Only Windows 2000 Professional and newer support the L2TP tunneling protocol.
126
________ is the local authentication protocol that is used by default for Microsoft Active Directory and Novell Directory Services.
Kerberos
127
The ________ protocol is used for smart cards.
Extensible Authentication Protocol (EAP)
128
True or False: | All Microsoft clients can use MS-CHAPv2.
False. | Only Windows 2000 Professional and later clients can use MS-CHAPv2
129
________ is used as a carrier access method on 802.11a/b/g/n networks.
CSMA/CA
130
True or False: | Fiber-optic cables are completely immune to EMI.
True
131
True or False: | Some fiber-optic cables can carry a signal for over 10 kilometers.
True
132
True or False: | Virtual servers are actually larger than physical servers.
False. | Virtual servers are made of software and are not in a physical form at all.
133
True or False: The colors of the wires in a network cable must be arranged in accordance with the network cable color standard in order for the cable to function correctly.
False. You should follow the standards to avoid confusion and misconfiguration, but other combinations could work as long as you were consistent.
134
A ________ can be used to verify connectivity in a cable without attaching the cable to a network.
media tester
135
True or False: | A punch-down tool is often used to secure coaxial cables to a patch panel.
False. | A punch down tool is not used with coaxial cable, it's used with twisted-pair cable.
136
In the media-testing duo referred to as the fox and hound, the hound is actually a ________ and a ________.
tone generator, tone locator
137
A ________ is a hardware device and/or software package that prevents packets from flowing through an interface from one network to another unless they meet a specified criterion.
firewall
138
A ________ service makes a connection to the Internet on behalf of a user.
proxy
139
True or False: | Some firewalls can work at layer 7 of the OSI model.
True
140
True or False: | To operate properly, a proxy service must be placed logically between the client and the Internet.
True
141
If port 80 is blocked on a firewall, then the ________ protocol will not function through the firewall.
HTTP
142
True or False: | HTTP and HTTPS both use the same port.
False. HTTP uses port 80, while HTTPS uses port 443.
143
________ are logical subnets that are formed using switches.
VLANs (virtual local area networks)
144
True or False: | VLANs can reduce the effect of broadcasts across an entire network.
True
145
True or False: | VLANs can provide security.
True
146
True or False: | Switch ports can be assigned to multiple VLANs, making VLANs very flexible.
False. | Each switchport is generally assigned to only one VLAN.
147
True or False: | With virtualization, one physical computer can host only one virtual computer.
False. | With virtualization, one physical computer can host many virtual computers simultaneously.
148
An ________ allows users to access shared company information with their browsers without accessing the Internet.
intranet
149
True or False: The main purpose of antivirus software is to protect your computer by detecting and eradicating viruses before they have a chance to damage your computer.
True
150
________ can be defined as the ability to lose a network component without losing data and or functionality.
Fault tolerance
151
Fault-tolerant power usually comes in the form of a ________.
UPS (uninterruptible power supply)
152
True or False: | BGP is a distance vector routing protocol designed to work between autonomous systems.
True
153
True or False: | 802.11g/n use CSMA/CD rather than CSMA/CA.
False. | 802.11a/b/g/n use CSMA/CA
154
169.254.1.1 is an example of an ________ address.
APIPA (automatic private internet protocol address)
155
True or False: | OSPF is a distance vector routing protocol.
False. | OSPF is a link-state routing protocol.
156
True or False: | For security purposes, you should always change the default configuration when installing a wireless access point.
True
157
A packet that has one source address and one destination address is referred to as a
unicast
158
A packet that has one source address and a list or range of destination addresses is referred to as a ________.
multicast
159
________ is a modern protocol that combines the advantages of Frame Relay and ATM and speeds routing by using labels so that decision can be made much more quickly.
multiple protocol label switching (MPLS)
160
True or False: | EIGRP is a link state routing protocol with distance vector attributes.
False. | EIGRP is a distance vector routing protocol with link-state attributes.
161
True or False: | EIGRP is a distance vector routing protocol with link state attributes.
True
162
________ uses 53 byte cells rather than variable-length packets
asynchronous transfer mode (ATM)
163
________ are layer 3 devices that can move packets from one subnet to another.
routers
164
True or False: | Some legacy applications still use NetBIOS names to identify computers.
True
165
True or False: | A hostname can be a maximum of 15 characters long.
False. A NetBIOS name is limited to 15 characters, but a hostname can be much longer, up to 255 characters including the delimiting "dots."
166
True or False: | Hostnames exist in a flat namespace.
False. | Hostnames exist in a hierarchical namespace.
167
Previously resolved IP-to-MAC addresses are stored in the ARP cache on a Microsoft client for about ________ minutes.
10
168
You can view the ARP cache on a computer by typing ________ on a command line.
arp -a
169
True or False: | nslookup is a tool that can be used to test and verify NetBIOS name resolution.
False
170
True or False: | The netstat command lists NetBIOS over TCP/IP statistics.
False
171
A ________ record provides reverse lookups in DNS.
PTR
172
________ is a dynamic database that resolves hostnames to IP addresses.
DNS (Domain Name System)
173
True or False: | IP addresses for clients must be unique within a client's subnet.
True
174
________ increases throughput by allowing multiple paths for traffic on the same session.
load balancing
175
The ipconfig command with no switches displays the IP address, subnet mask, and ________ of the computer interfaces.
default gateway
176
True or False: | The name resolution server addresses for a client computer can be configured automatically using a DHCP server
True
177
True or False: | The manual settings configured for a proxy server will always override any automatic configuration settings.
False. | Automatic settings for a proxy will override manual settings.
178
True or False: | Dial-up connections are much more secure than VPN connections, which must go through the Internet servers
False. | VPN connections are typically much more secure than dialup connections.
179
True or False: | Fiber-optic cables are twisted to prevent EMI
False. Fiber-optic cables are not twisted and cannot suffer from electromagnetic interference (EMI), since they use light instead of electricity
180
________ are specific logical addresses to which applications are assigned in a computer.
Ports
181
True or False: | A virtual switch can perform most of the same functions as a physical switch.
True
182
A technology that allows a switch or other device to use and distribute Ethernet current to power the devices is called .
Power over Ethernet (PoE)
183
True or False: | QoS is a way of prioritizing traffic by protocol.
True
184
True or False: | Single-mode fiber is generally used within buildings, whereas multimode is used for longer runs between buildings
False. | Multimode fiber is typically used within buildings, whereas singlemode fiber is used on longer runs between buildings
185
A protocol used with VLANs that reduces administrative effort and increases accuracy when multiple switches are used, by allowing one switch to propagate information to many others is referred to as _______
VLAN Trunking Protocol (VTP)
186
What is the largest recommended number of computers in a SOHO network?
10
187
An interference caused by wires that run parallel to each other and not twisted together is called ________.
crosstalk
188
An interference caused by wires running past speakers, fluorescent light ballasts, or electric motors is referred as ________.
electromagnetic interference (EMI
189
A device that is used specifically to create a tunnel for communication through an inherently unsecure medium is a ________.
VPN concentrator
190
If you are installing cables in between the ceiling tiles of a building, you may be required by a law to use a special type of cable called a ________ cable.
plenum
191
True or False: | You should either use a host firewall or antivirus software on a computer, but not both.
False. | It is very common to use antivirus software and a firewall on the same computer.
192
VLANs use special ports between switches called ________.
trunks
193
True or False: | A VLAN is a logical network design that does not have to conform to a physical network topology.
True
194
True or False: | Port authentication is the only form of security that most networks need
False. Port authentication is only one form of security and it is not generally considered to be a high degree of security. Networks need many other forms of security to protect them from attack and corruption
195
True or False: | Clients that are configured with static IP addresses will fail immediately if the DHCP server fails
False. | Clients that are configured with static IP addresses will be unaffected by the failure of a DHCP server
196
True or False: | Clients that are configured automatically from a DHCP server will fail immediately if the DHCP server fails
False. The failure of a DHCP server will keep clients from receiving new IP address assignments and leases, but those that have received their addresses already will keep them until the lease period expires
197
A device that poses as a server with sensitive data to distract or even trap an attacker is referred to as a ________.
honeypot
198
A device that can be installed into a network with preconfigurations of normal network traffic so that it can determine what is normal and block or even terminate sessions when something is not normal is a ________.
signature-based IPS
199
True or False: Nessus is a vulnerability scanning software that can find misconfigurations and open ports that could allow an attacker to take control of your systems
True
200
A situation that allows current to flow on a different path than was originally intended in the circuit is a(n) _________.
open short or short circuit