Podcast
Questions and Answers
Which protocol in IPsec provides both authentication and encryption?
Which protocol in IPsec provides both authentication and encryption?
What is the main criteria used by firewalls to filter traffic?
What is the main criteria used by firewalls to filter traffic?
Protocols and Ports
What type of connection should you use to connect a network adapter to a switch that allows sending and receiving data at the same time?
What type of connection should you use to connect a network adapter to a switch that allows sending and receiving data at the same time?
Full duplex
What is the maximum throughput of a T1 line?
What is the maximum throughput of a T1 line?
Signup and view all the answers
Which type of VPN will you set up between two companies collaborating on a project?
Which type of VPN will you set up between two companies collaborating on a project?
Signup and view all the answers
Which are examples of leased lines?
Which are examples of leased lines?
Signup and view all the answers
Besides 802.11ac, which wireless standards will work with 802.11ac routers?
Besides 802.11ac, which wireless standards will work with 802.11ac routers?
Signup and view all the answers
Which wireless tool should you use to connect three wireless networks together: 802.11a, 802.11g, and 802.11n?
Which wireless tool should you use to connect three wireless networks together: 802.11a, 802.11g, and 802.11n?
Signup and view all the answers
Connecting several computers together in a circle without the use of a hub or switch is using what type of topology?
Connecting several computers together in a circle without the use of a hub or switch is using what type of topology?
Signup and view all the answers
In a _________ topology, every single computer is connected to every other computer on the network.
In a _________ topology, every single computer is connected to every other computer on the network.
Signup and view all the answers
A __________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.
A __________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.
Signup and view all the answers
Which role needs to be added to Windows Server 2016 to enable routing through the server?
Which role needs to be added to Windows Server 2016 to enable routing through the server?
Signup and view all the answers
Which type of network cables can carry signals over the longest distances?
Which type of network cables can carry signals over the longest distances?
Signup and view all the answers
What command line command will give you the MAC address of the network adapter for the computer you are currently working on?
What command line command will give you the MAC address of the network adapter for the computer you are currently working on?
Signup and view all the answers
Which IP class is the best option for setting up 750 computers on the same network?
Which IP class is the best option for setting up 750 computers on the same network?
Signup and view all the answers
What will be the subnet mask for a 192.168.1.0 network using a Class C network?
What will be the subnet mask for a 192.168.1.0 network using a Class C network?
Signup and view all the answers
You should implement a(n) _______________ address for a group of IPv6 network interfaces where each packet is delivered to each interface.
You should implement a(n) _______________ address for a group of IPv6 network interfaces where each packet is delivered to each interface.
Signup and view all the answers
What is the local loopback address in IPv6?
What is the local loopback address in IPv6?
Signup and view all the answers
Which file resolves NetBIOS names to IP addresses?
Which file resolves NetBIOS names to IP addresses?
Signup and view all the answers
Which data transmission method uses a private tunnel over a public network?
Which data transmission method uses a private tunnel over a public network?
Signup and view all the answers
Which two statements are true about Microsoft security zones?
Which two statements are true about Microsoft security zones?
Signup and view all the answers
1 Kbps equals
1 Kbps equals
Signup and view all the answers
10 Mbps equals
10 Mbps equals
Signup and view all the answers
1 Gbps equals
1 Gbps equals
Signup and view all the answers
1000 Kbps equals
1000 Kbps equals
Signup and view all the answers
E1 connections use 32 channels to obtain a top speed of ____________.
E1 connections use 32 channels to obtain a top speed of ____________.
Signup and view all the answers
How many T1 lines are used for a full T3 connection?
How many T1 lines are used for a full T3 connection?
Signup and view all the answers
An example of a physical _____ topology would be eight hubs connected to a single switch.
An example of a physical _____ topology would be eight hubs connected to a single switch.
Signup and view all the answers
In a star topology, a bad cable affects only ____ interfaces.
In a star topology, a bad cable affects only ____ interfaces.
Signup and view all the answers
In a star topology, failure of a central connectivity device ____________ bring down the entire network.
In a star topology, failure of a central connectivity device ____________ bring down the entire network.
Signup and view all the answers
In a star topology, a central connection point _____________ flexibility and scalability.
In a star topology, a central connection point _____________ flexibility and scalability.
Signup and view all the answers
A _______________ makes multiple physical switches appear as one logical switch.
A _______________ makes multiple physical switches appear as one logical switch.
Signup and view all the answers
_________________ is not limited to routers and is available on switches.
_________________ is not limited to routers and is available on switches.
Signup and view all the answers
Switches can use __________________ load balancing.
Switches can use __________________ load balancing.
Signup and view all the answers
Layer 2 switches use what to determine where to forward frames?
Layer 2 switches use what to determine where to forward frames?
Signup and view all the answers
If a ________ does not know where to forward a frame, it floods it out all ports.
If a ________ does not know where to forward a frame, it floods it out all ports.
Signup and view all the answers
A router is a device that functions primarily on what layer of the OSI model?
A router is a device that functions primarily on what layer of the OSI model?
Signup and view all the answers
Which IP address in a routing table signifies a default route?
Which IP address in a routing table signifies a default route?
Signup and view all the answers
Microwave ovens cannot cause ________________ in wired networks.
Microwave ovens cannot cause ________________ in wired networks.
Signup and view all the answers
________________ can cause EMI.
________________ can cause EMI.
Signup and view all the answers
_______________ can cause interference for wireless networks.
_______________ can cause interference for wireless networks.
Signup and view all the answers
What is the speed of a Cat5 port?
What is the speed of a Cat5 port?
Signup and view all the answers
What is the speed of a Cat3 port?
What is the speed of a Cat3 port?
Signup and view all the answers
What is the speed of a Cat5e port?
What is the speed of a Cat5e port?
Signup and view all the answers
What is the port for PPTP?
What is the port for PPTP?
Signup and view all the answers
What is the port for L2TP?
What is the port for L2TP?
Signup and view all the answers
What is the tunneling protocol used by MPPE?
What is the tunneling protocol used by MPPE?
Signup and view all the answers
What is the tunneling protocol used by IPsec?
What is the tunneling protocol used by IPsec?
Signup and view all the answers
What is the tunneling protocol for HTTPS?
What is the tunneling protocol for HTTPS?
Signup and view all the answers
What does a router connect?
What does a router connect?
Signup and view all the answers
What technology is used on Layer 1 of the OSI model to transmit data?
What technology is used on Layer 1 of the OSI model to transmit data?
Signup and view all the answers
Unsecured websites are accessed through port 80 by default.
Unsecured websites are accessed through port 80 by default.
Signup and view all the answers
Public websites are accessed through port 25.
Public websites are accessed through port 25.
Signup and view all the answers
Secured websites are accessed through port 443 by default.
Secured websites are accessed through port 443 by default.
Signup and view all the answers
What class is the IP address 100.100.1.1?
What class is the IP address 100.100.1.1?
Signup and view all the answers
What class is the IP address 170.100.1.5?
What class is the IP address 170.100.1.5?
Signup and view all the answers
What class is the IP address 198.126.1.55?
What class is the IP address 198.126.1.55?
Signup and view all the answers
What class is the IP address 244.0.0.2?
What class is the IP address 244.0.0.2?
Signup and view all the answers
Which record resolves hostnames to 128-bit IP addresses?
Which record resolves hostnames to 128-bit IP addresses?
Signup and view all the answers
What command deletes an IP address bound to an interface?
What command deletes an IP address bound to an interface?
Signup and view all the answers
What command acquires an IP address from a DHCP server?
What command acquires an IP address from a DHCP server?
Signup and view all the answers
Dhcp -release is NOT the command that deletes an IP address bound to an interface.
Dhcp -release is NOT the command that deletes an IP address bound to an interface.
Signup and view all the answers
Firewalls mainly use ____________ to filter data packets.
Firewalls mainly use ____________ to filter data packets.
Signup and view all the answers
Firewalls can be which types?
Firewalls can be which types?
Signup and view all the answers
Firewalls are sometimes set up on individual host machines.
Firewalls are sometimes set up on individual host machines.
Signup and view all the answers
What command is used to determine the path that an IP packet has taken to reach a destination?
What command is used to determine the path that an IP packet has taken to reach a destination?
Signup and view all the answers
If statistics showing the percentage of dropped packets are needed, what should be used instead of tracert?
If statistics showing the percentage of dropped packets are needed, what should be used instead of tracert?
Signup and view all the answers
Which command shows information on listening and established ports?
Which command shows information on listening and established ports?
Signup and view all the answers
Which command shows the same info but only for TCP connections?
Which command shows the same info but only for TCP connections?
Signup and view all the answers
RIP routing protocols calculates routes based on what?
RIP routing protocols calculates routes based on what?
Signup and view all the answers
What command is used to display the DNS cache?
What command is used to display the DNS cache?
Signup and view all the answers
What command is used to purge (get rid of) the DNS cache?
What command is used to purge (get rid of) the DNS cache?
Signup and view all the answers
Study Notes
IPsec and Network Protocols
- Encapsulating Security Payload (ESP): Provides both authentication and encryption in IPsec.
- Firewalls filter traffic primarily based on protocols and ports.
Network Connections
- Use full duplex connections for simultaneous data transmission on network adapters connecting to switches.
- T1 line offers a maximum throughput of 1.544 Mbps.
VPN and Leased Lines
- Site-to-Site VPNs are ideal for connecting two companies collaborating on a project.
- Examples of leased lines include DSL.
Wireless Standards
- 802.11ac routers are compatible with 802.11n (300 Mbps at 2.4/5 GHz) and 802.11a (54 Mbps at 5 GHz).
Wireless Networking Tools
- A wireless bridge connects different wireless networks, such as 802.11a, 802.11g, and 802.11n.
Network Topologies
- Ring topology connects computers in a circular layout.
- Mesh topology connects every computer directly to every other computer.
- Switch creates separate collision domains, allowing full duplex operations without collisions.
Server Roles and Network Cables
- Remote Access role on Windows Server 2016 enables routing.
- Single-mode fiber cables support the longest signal distances.
IP Addressing and Subnetting
- Use ipconfig /all to find a computer's MAC address.
- For 750 computers, a Class B IP address is recommended.
- A Class C network's subnet mask for 192.168.1.0 is 255.255.255.0.
IPv6 and Network Addresses
- Implement a multicast address for distributing packets to a group of IPv6 interfaces.
- The local loopback address in IPv6 is ::1.
Name Resolution
- LMHOSTS file resolves NetBIOS names to IP addresses.
VPNs and Security Protocols
- A VPN creates a private tunnel over public networks.
- Several tunneling protocols include PPTP, L2TP, and SSTP.
Ethernet and Port Specifications
- Ethernet operates on Layer 1 of the OSI model.
- Cat5 supports speeds of 100 Mbps, while Cat5e supports 1 Gbps.
- Unsecured websites typically use port 80, while secured ones use port 443.
Classful Addressing
- Class A example IP: 100.100.1.1; Class B example IP: 170.100.1.5; Class C example IP: 198.126.1.55; Class D example IP: 244.0.0.2.
DNS and IP Configuration Commands
- AAAA records map hostnames to IPv6 addresses.
- Commands related to IP address management include:
- ipconfig /release to delete an IP address.
- ipconfig /renew to acquire an IP address from DHCP.
- ipconfig /displaydns to show DNS cache.
- ipconfig /flushdns to purged DNS cache.
Tracing and Network Statistics
- tracert is used to trace the path of IP packets across a network.
- Use pathping to find packet loss statistics.
- netstat -a displays all listening and established ports, while netstat -p tcp shows info for TCP connections.
Routing Protocols
- RIP routing uses hop counts for route calculation, with a maximum of 15 hops.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on networking concepts with these flashcards from the MTA training course. Each card focuses on key protocols, filtering criteria, and connection types essential for network management. Perfect for preparing for your MTA certification!