MTA Training Test 1 Flashcards
72 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which protocol in IPsec provides both authentication and encryption?

  • Transport Mode (TM)
  • Encapsulating Security Payload (ESP) (correct)
  • Authentication Header (AH)
  • Internet Key Exchange (IKE)
  • What is the main criteria used by firewalls to filter traffic?

    Protocols and Ports

    What type of connection should you use to connect a network adapter to a switch that allows sending and receiving data at the same time?

    Full duplex

    What is the maximum throughput of a T1 line?

    <p>1.544 Mbps</p> Signup and view all the answers

    Which type of VPN will you set up between two companies collaborating on a project?

    <p>Site-to-Site</p> Signup and view all the answers

    Which are examples of leased lines?

    <p>DSL</p> Signup and view all the answers

    Besides 802.11ac, which wireless standards will work with 802.11ac routers?

    <p>802.11n and 802.11a</p> Signup and view all the answers

    Which wireless tool should you use to connect three wireless networks together: 802.11a, 802.11g, and 802.11n?

    <p>Wireless bridge</p> Signup and view all the answers

    Connecting several computers together in a circle without the use of a hub or switch is using what type of topology?

    <p>Ring</p> Signup and view all the answers

    In a _________ topology, every single computer is connected to every other computer on the network.

    <p>Mesh</p> Signup and view all the answers

    A __________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.

    <p>Switch</p> Signup and view all the answers

    Which role needs to be added to Windows Server 2016 to enable routing through the server?

    <p>Remote Access</p> Signup and view all the answers

    Which type of network cables can carry signals over the longest distances?

    <p>Single-mode fiber</p> Signup and view all the answers

    What command line command will give you the MAC address of the network adapter for the computer you are currently working on?

    <p>ipconfig /all</p> Signup and view all the answers

    Which IP class is the best option for setting up 750 computers on the same network?

    <p>Class B</p> Signup and view all the answers

    What will be the subnet mask for a 192.168.1.0 network using a Class C network?

    <p>255.255.255.0</p> Signup and view all the answers

    You should implement a(n) _______________ address for a group of IPv6 network interfaces where each packet is delivered to each interface.

    <p>Multicast</p> Signup and view all the answers

    What is the local loopback address in IPv6?

    <p>::1</p> Signup and view all the answers

    Which file resolves NetBIOS names to IP addresses?

    <p>LMHOSTS</p> Signup and view all the answers

    Which data transmission method uses a private tunnel over a public network?

    <p>VPN</p> Signup and view all the answers

    Which two statements are true about Microsoft security zones?

    <p>The default security level for Local intranet and Trusted sites is the same.</p> Signup and view all the answers

    1 Kbps equals

    <p>1000 bits per second</p> Signup and view all the answers

    10 Mbps equals

    <p>10,000,000 bits per second</p> Signup and view all the answers

    1 Gbps equals

    <p>1,000,000,000 bits per second</p> Signup and view all the answers

    1000 Kbps equals

    <p>1 Mbps</p> Signup and view all the answers

    E1 connections use 32 channels to obtain a top speed of ____________.

    <p>2.048 Mbps</p> Signup and view all the answers

    How many T1 lines are used for a full T3 connection?

    <p>28 lines</p> Signup and view all the answers

    An example of a physical _____ topology would be eight hubs connected to a single switch.

    <p>Star</p> Signup and view all the answers

    In a star topology, a bad cable affects only ____ interfaces.

    <p>two</p> Signup and view all the answers

    In a star topology, failure of a central connectivity device ____________ bring down the entire network.

    <p>does not</p> Signup and view all the answers

    In a star topology, a central connection point _____________ flexibility and scalability.

    <p>allows for</p> Signup and view all the answers

    A _______________ makes multiple physical switches appear as one logical switch.

    <p>switch stack</p> Signup and view all the answers

    _________________ is not limited to routers and is available on switches.

    <p>Load balancing</p> Signup and view all the answers

    Switches can use __________________ load balancing.

    <p>active-passive</p> Signup and view all the answers

    Layer 2 switches use what to determine where to forward frames?

    <p>MAC addresses tables</p> Signup and view all the answers

    If a ________ does not know where to forward a frame, it floods it out all ports.

    <p>switch</p> Signup and view all the answers

    A router is a device that functions primarily on what layer of the OSI model?

    <p>Network</p> Signup and view all the answers

    Which IP address in a routing table signifies a default route?

    <p>0.0.0.0</p> Signup and view all the answers

    Microwave ovens cannot cause ________________ in wired networks.

    <p>interference</p> Signup and view all the answers

    ________________ can cause EMI.

    <p>fluorescent lighting</p> Signup and view all the answers

    _______________ can cause interference for wireless networks.

    <p>Cordless phones</p> Signup and view all the answers

    What is the speed of a Cat5 port?

    <p>100 Mbps</p> Signup and view all the answers

    What is the speed of a Cat3 port?

    <p>10 Mbps</p> Signup and view all the answers

    What is the speed of a Cat5e port?

    <p>1 Gbps</p> Signup and view all the answers

    What is the port for PPTP?

    <p>TCP/UDP 1723</p> Signup and view all the answers

    What is the port for L2TP?

    <p>UDP 1701</p> Signup and view all the answers

    What is the tunneling protocol used by MPPE?

    <p>PPTP</p> Signup and view all the answers

    What is the tunneling protocol used by IPsec?

    <p>L2TP</p> Signup and view all the answers

    What is the tunneling protocol for HTTPS?

    <p>SSTP</p> Signup and view all the answers

    What does a router connect?

    <p>Two networks using different protocols</p> Signup and view all the answers

    What technology is used on Layer 1 of the OSI model to transmit data?

    <p>Ethernet</p> Signup and view all the answers

    Unsecured websites are accessed through port 80 by default.

    <p>True</p> Signup and view all the answers

    Public websites are accessed through port 25.

    <p>False</p> Signup and view all the answers

    Secured websites are accessed through port 443 by default.

    <p>True</p> Signup and view all the answers

    What class is the IP address 100.100.1.1?

    <p>Class A</p> Signup and view all the answers

    What class is the IP address 170.100.1.5?

    <p>Class B</p> Signup and view all the answers

    What class is the IP address 198.126.1.55?

    <p>Class C</p> Signup and view all the answers

    What class is the IP address 244.0.0.2?

    <p>Class D</p> Signup and view all the answers

    Which record resolves hostnames to 128-bit IP addresses?

    <p>AAAA</p> Signup and view all the answers

    What command deletes an IP address bound to an interface?

    <p>ipconfig /release</p> Signup and view all the answers

    What command acquires an IP address from a DHCP server?

    <p>ipconfig /renew</p> Signup and view all the answers

    Dhcp -release is NOT the command that deletes an IP address bound to an interface.

    <p>True</p> Signup and view all the answers

    Firewalls mainly use ____________ to filter data packets.

    <p>ports and protocols</p> Signup and view all the answers

    Firewalls can be which types?

    <p>Software</p> Signup and view all the answers

    Firewalls are sometimes set up on individual host machines.

    <p>True</p> Signup and view all the answers

    What command is used to determine the path that an IP packet has taken to reach a destination?

    <p>tracert</p> Signup and view all the answers

    If statistics showing the percentage of dropped packets are needed, what should be used instead of tracert?

    <p>pathping</p> Signup and view all the answers

    Which command shows information on listening and established ports?

    <p>netstat -a</p> Signup and view all the answers

    Which command shows the same info but only for TCP connections?

    <p>netstat -p tcp</p> Signup and view all the answers

    RIP routing protocols calculates routes based on what?

    <p>Number of hops required</p> Signup and view all the answers

    What command is used to display the DNS cache?

    <p>ipconfig /displaydns</p> Signup and view all the answers

    What command is used to purge (get rid of) the DNS cache?

    <p>ipconfig /flushdns</p> Signup and view all the answers

    Study Notes

    IPsec and Network Protocols

    • Encapsulating Security Payload (ESP): Provides both authentication and encryption in IPsec.
    • Firewalls filter traffic primarily based on protocols and ports.

    Network Connections

    • Use full duplex connections for simultaneous data transmission on network adapters connecting to switches.
    • T1 line offers a maximum throughput of 1.544 Mbps.

    VPN and Leased Lines

    • Site-to-Site VPNs are ideal for connecting two companies collaborating on a project.
    • Examples of leased lines include DSL.

    Wireless Standards

    • 802.11ac routers are compatible with 802.11n (300 Mbps at 2.4/5 GHz) and 802.11a (54 Mbps at 5 GHz).

    Wireless Networking Tools

    • A wireless bridge connects different wireless networks, such as 802.11a, 802.11g, and 802.11n.

    Network Topologies

    • Ring topology connects computers in a circular layout.
    • Mesh topology connects every computer directly to every other computer.
    • Switch creates separate collision domains, allowing full duplex operations without collisions.

    Server Roles and Network Cables

    • Remote Access role on Windows Server 2016 enables routing.
    • Single-mode fiber cables support the longest signal distances.

    IP Addressing and Subnetting

    • Use ipconfig /all to find a computer's MAC address.
    • For 750 computers, a Class B IP address is recommended.
    • A Class C network's subnet mask for 192.168.1.0 is 255.255.255.0.

    IPv6 and Network Addresses

    • Implement a multicast address for distributing packets to a group of IPv6 interfaces.
    • The local loopback address in IPv6 is ::1.

    Name Resolution

    • LMHOSTS file resolves NetBIOS names to IP addresses.

    VPNs and Security Protocols

    • A VPN creates a private tunnel over public networks.
    • Several tunneling protocols include PPTP, L2TP, and SSTP.

    Ethernet and Port Specifications

    • Ethernet operates on Layer 1 of the OSI model.
    • Cat5 supports speeds of 100 Mbps, while Cat5e supports 1 Gbps.
    • Unsecured websites typically use port 80, while secured ones use port 443.

    Classful Addressing

    • Class A example IP: 100.100.1.1; Class B example IP: 170.100.1.5; Class C example IP: 198.126.1.55; Class D example IP: 244.0.0.2.

    DNS and IP Configuration Commands

    • AAAA records map hostnames to IPv6 addresses.
    • Commands related to IP address management include:
      • ipconfig /release to delete an IP address.
      • ipconfig /renew to acquire an IP address from DHCP.
      • ipconfig /displaydns to show DNS cache.
      • ipconfig /flushdns to purged DNS cache.

    Tracing and Network Statistics

    • tracert is used to trace the path of IP packets across a network.
    • Use pathping to find packet loss statistics.
    • netstat -a displays all listening and established ports, while netstat -p tcp shows info for TCP connections.

    Routing Protocols

    • RIP routing uses hop counts for route calculation, with a maximum of 15 hops.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on networking concepts with these flashcards from the MTA training course. Each card focuses on key protocols, filtering criteria, and connection types essential for network management. Perfect for preparing for your MTA certification!

    More Like This

    IPSec Fundamentals Quiz
    10 questions

    IPSec Fundamentals Quiz

    InviolableDalmatianJasper avatar
    InviolableDalmatianJasper
    Network-Layer Security: IPsec and VPNs Quiz
    5 questions
    IPSec Protocols in Network Security
    30 questions
    Use Quizgecko on...
    Browser
    Browser