MTA Training Test 1 Flashcards

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which protocol in IPsec provides both authentication and encryption?

  • Transport Mode (TM)
  • Encapsulating Security Payload (ESP) (correct)
  • Authentication Header (AH)
  • Internet Key Exchange (IKE)

What is the main criteria used by firewalls to filter traffic?

Protocols and Ports

What type of connection should you use to connect a network adapter to a switch that allows sending and receiving data at the same time?

Full duplex

What is the maximum throughput of a T1 line?

<p>1.544 Mbps</p> Signup and view all the answers

Which type of VPN will you set up between two companies collaborating on a project?

<p>Site-to-Site</p> Signup and view all the answers

Which are examples of leased lines?

<p>DSL (A)</p> Signup and view all the answers

Besides 802.11ac, which wireless standards will work with 802.11ac routers?

<p>802.11n and 802.11a</p> Signup and view all the answers

Which wireless tool should you use to connect three wireless networks together: 802.11a, 802.11g, and 802.11n?

<p>Wireless bridge</p> Signup and view all the answers

Connecting several computers together in a circle without the use of a hub or switch is using what type of topology?

<p>Ring</p> Signup and view all the answers

In a _________ topology, every single computer is connected to every other computer on the network.

<p>Mesh</p> Signup and view all the answers

A __________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.

<p>Switch</p> Signup and view all the answers

Which role needs to be added to Windows Server 2016 to enable routing through the server?

<p>Remote Access</p> Signup and view all the answers

Which type of network cables can carry signals over the longest distances?

<p>Single-mode fiber</p> Signup and view all the answers

What command line command will give you the MAC address of the network adapter for the computer you are currently working on?

<p>ipconfig /all</p> Signup and view all the answers

Which IP class is the best option for setting up 750 computers on the same network?

<p>Class B</p> Signup and view all the answers

What will be the subnet mask for a 192.168.1.0 network using a Class C network?

<p>255.255.255.0</p> Signup and view all the answers

You should implement a(n) _______________ address for a group of IPv6 network interfaces where each packet is delivered to each interface.

<p>Multicast</p> Signup and view all the answers

What is the local loopback address in IPv6?

<p>::1</p> Signup and view all the answers

Which file resolves NetBIOS names to IP addresses?

<p>LMHOSTS</p> Signup and view all the answers

Which data transmission method uses a private tunnel over a public network?

<p>VPN</p> Signup and view all the answers

Which two statements are true about Microsoft security zones?

<p>The default security level for Local intranet and Trusted sites is the same. (B), Internet Explorer has 4 security zones. (D)</p> Signup and view all the answers

1 Kbps equals

<p>1000 bits per second</p> Signup and view all the answers

10 Mbps equals

<p>10,000,000 bits per second</p> Signup and view all the answers

1 Gbps equals

<p>1,000,000,000 bits per second</p> Signup and view all the answers

1000 Kbps equals

<p>1 Mbps</p> Signup and view all the answers

E1 connections use 32 channels to obtain a top speed of ____________.

<p>2.048 Mbps</p> Signup and view all the answers

How many T1 lines are used for a full T3 connection?

<p>28 lines</p> Signup and view all the answers

An example of a physical _____ topology would be eight hubs connected to a single switch.

<p>Star</p> Signup and view all the answers

In a star topology, a bad cable affects only ____ interfaces.

<p>two</p> Signup and view all the answers

In a star topology, failure of a central connectivity device ____________ bring down the entire network.

<p>does not</p> Signup and view all the answers

In a star topology, a central connection point _____________ flexibility and scalability.

<p>allows for</p> Signup and view all the answers

A _______________ makes multiple physical switches appear as one logical switch.

<p>switch stack</p> Signup and view all the answers

_________________ is not limited to routers and is available on switches.

<p>Load balancing</p> Signup and view all the answers

Switches can use __________________ load balancing.

<p>active-passive</p> Signup and view all the answers

Layer 2 switches use what to determine where to forward frames?

<p>MAC addresses tables</p> Signup and view all the answers

If a ________ does not know where to forward a frame, it floods it out all ports.

<p>switch</p> Signup and view all the answers

A router is a device that functions primarily on what layer of the OSI model?

<p>Network</p> Signup and view all the answers

Which IP address in a routing table signifies a default route?

<p>0.0.0.0</p> Signup and view all the answers

Microwave ovens cannot cause ________________ in wired networks.

<p>interference</p> Signup and view all the answers

________________ can cause EMI.

<p>fluorescent lighting</p> Signup and view all the answers

_______________ can cause interference for wireless networks.

<p>Cordless phones</p> Signup and view all the answers

What is the speed of a Cat5 port?

<p>100 Mbps</p> Signup and view all the answers

What is the speed of a Cat3 port?

<p>10 Mbps</p> Signup and view all the answers

What is the speed of a Cat5e port?

<p>1 Gbps</p> Signup and view all the answers

What is the port for PPTP?

<p>TCP/UDP 1723</p> Signup and view all the answers

What is the port for L2TP?

<p>UDP 1701</p> Signup and view all the answers

What is the tunneling protocol used by MPPE?

<p>PPTP</p> Signup and view all the answers

What is the tunneling protocol used by IPsec?

<p>L2TP</p> Signup and view all the answers

What is the tunneling protocol for HTTPS?

<p>SSTP</p> Signup and view all the answers

What does a router connect?

<p>Two networks using different protocols</p> Signup and view all the answers

What technology is used on Layer 1 of the OSI model to transmit data?

<p>Ethernet</p> Signup and view all the answers

Unsecured websites are accessed through port 80 by default.

<p>True (A)</p> Signup and view all the answers

Public websites are accessed through port 25.

<p>False (B)</p> Signup and view all the answers

Secured websites are accessed through port 443 by default.

<p>True (A)</p> Signup and view all the answers

What class is the IP address 100.100.1.1?

<p>Class A</p> Signup and view all the answers

What class is the IP address 170.100.1.5?

<p>Class B</p> Signup and view all the answers

What class is the IP address 198.126.1.55?

<p>Class C</p> Signup and view all the answers

What class is the IP address 244.0.0.2?

<p>Class D</p> Signup and view all the answers

Which record resolves hostnames to 128-bit IP addresses?

<p>AAAA</p> Signup and view all the answers

What command deletes an IP address bound to an interface?

<p>ipconfig /release</p> Signup and view all the answers

What command acquires an IP address from a DHCP server?

<p>ipconfig /renew</p> Signup and view all the answers

Dhcp -release is NOT the command that deletes an IP address bound to an interface.

<p>True (A)</p> Signup and view all the answers

Firewalls mainly use ____________ to filter data packets.

<p>ports and protocols</p> Signup and view all the answers

Firewalls can be which types?

<p>Software (B), Hardware (C)</p> Signup and view all the answers

Firewalls are sometimes set up on individual host machines.

<p>True (A)</p> Signup and view all the answers

What command is used to determine the path that an IP packet has taken to reach a destination?

<p>tracert</p> Signup and view all the answers

If statistics showing the percentage of dropped packets are needed, what should be used instead of tracert?

<p>pathping</p> Signup and view all the answers

Which command shows information on listening and established ports?

<p>netstat -a</p> Signup and view all the answers

Which command shows the same info but only for TCP connections?

<p>netstat -p tcp</p> Signup and view all the answers

RIP routing protocols calculates routes based on what?

<p>Number of hops required</p> Signup and view all the answers

What command is used to display the DNS cache?

<p>ipconfig /displaydns</p> Signup and view all the answers

What command is used to purge (get rid of) the DNS cache?

<p>ipconfig /flushdns</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

IPsec and Network Protocols

  • Encapsulating Security Payload (ESP): Provides both authentication and encryption in IPsec.
  • Firewalls filter traffic primarily based on protocols and ports.

Network Connections

  • Use full duplex connections for simultaneous data transmission on network adapters connecting to switches.
  • T1 line offers a maximum throughput of 1.544 Mbps.

VPN and Leased Lines

  • Site-to-Site VPNs are ideal for connecting two companies collaborating on a project.
  • Examples of leased lines include DSL.

Wireless Standards

  • 802.11ac routers are compatible with 802.11n (300 Mbps at 2.4/5 GHz) and 802.11a (54 Mbps at 5 GHz).

Wireless Networking Tools

  • A wireless bridge connects different wireless networks, such as 802.11a, 802.11g, and 802.11n.

Network Topologies

  • Ring topology connects computers in a circular layout.
  • Mesh topology connects every computer directly to every other computer.
  • Switch creates separate collision domains, allowing full duplex operations without collisions.

Server Roles and Network Cables

  • Remote Access role on Windows Server 2016 enables routing.
  • Single-mode fiber cables support the longest signal distances.

IP Addressing and Subnetting

  • Use ipconfig /all to find a computer's MAC address.
  • For 750 computers, a Class B IP address is recommended.
  • A Class C network's subnet mask for 192.168.1.0 is 255.255.255.0.

IPv6 and Network Addresses

  • Implement a multicast address for distributing packets to a group of IPv6 interfaces.
  • The local loopback address in IPv6 is ::1.

Name Resolution

  • LMHOSTS file resolves NetBIOS names to IP addresses.

VPNs and Security Protocols

  • A VPN creates a private tunnel over public networks.
  • Several tunneling protocols include PPTP, L2TP, and SSTP.

Ethernet and Port Specifications

  • Ethernet operates on Layer 1 of the OSI model.
  • Cat5 supports speeds of 100 Mbps, while Cat5e supports 1 Gbps.
  • Unsecured websites typically use port 80, while secured ones use port 443.

Classful Addressing

  • Class A example IP: 100.100.1.1; Class B example IP: 170.100.1.5; Class C example IP: 198.126.1.55; Class D example IP: 244.0.0.2.

DNS and IP Configuration Commands

  • AAAA records map hostnames to IPv6 addresses.
  • Commands related to IP address management include:
    • ipconfig /release to delete an IP address.
    • ipconfig /renew to acquire an IP address from DHCP.
    • ipconfig /displaydns to show DNS cache.
    • ipconfig /flushdns to purged DNS cache.

Tracing and Network Statistics

  • tracert is used to trace the path of IP packets across a network.
  • Use pathping to find packet loss statistics.
  • netstat -a displays all listening and established ports, while netstat -p tcp shows info for TCP connections.

Routing Protocols

  • RIP routing uses hop counts for route calculation, with a maximum of 15 hops.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Network-Layer Security: IPsec and VPNs Quiz
5 questions
IPSec Protocols in Network Security
30 questions
IPSec Overview and TCP/IP Security
27 questions
Use Quizgecko on...
Browser
Browser