Podcast
Questions and Answers
Which protocol in IPsec provides both authentication and encryption?
Which protocol in IPsec provides both authentication and encryption?
- Transport Mode (TM)
- Encapsulating Security Payload (ESP) (correct)
- Authentication Header (AH)
- Internet Key Exchange (IKE)
What is the main criteria used by firewalls to filter traffic?
What is the main criteria used by firewalls to filter traffic?
Protocols and Ports
What type of connection should you use to connect a network adapter to a switch that allows sending and receiving data at the same time?
What type of connection should you use to connect a network adapter to a switch that allows sending and receiving data at the same time?
Full duplex
What is the maximum throughput of a T1 line?
What is the maximum throughput of a T1 line?
Which type of VPN will you set up between two companies collaborating on a project?
Which type of VPN will you set up between two companies collaborating on a project?
Which are examples of leased lines?
Which are examples of leased lines?
Besides 802.11ac, which wireless standards will work with 802.11ac routers?
Besides 802.11ac, which wireless standards will work with 802.11ac routers?
Which wireless tool should you use to connect three wireless networks together: 802.11a, 802.11g, and 802.11n?
Which wireless tool should you use to connect three wireless networks together: 802.11a, 802.11g, and 802.11n?
Connecting several computers together in a circle without the use of a hub or switch is using what type of topology?
Connecting several computers together in a circle without the use of a hub or switch is using what type of topology?
In a _________ topology, every single computer is connected to every other computer on the network.
In a _________ topology, every single computer is connected to every other computer on the network.
A __________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.
A __________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.
Which role needs to be added to Windows Server 2016 to enable routing through the server?
Which role needs to be added to Windows Server 2016 to enable routing through the server?
Which type of network cables can carry signals over the longest distances?
Which type of network cables can carry signals over the longest distances?
What command line command will give you the MAC address of the network adapter for the computer you are currently working on?
What command line command will give you the MAC address of the network adapter for the computer you are currently working on?
Which IP class is the best option for setting up 750 computers on the same network?
Which IP class is the best option for setting up 750 computers on the same network?
What will be the subnet mask for a 192.168.1.0 network using a Class C network?
What will be the subnet mask for a 192.168.1.0 network using a Class C network?
You should implement a(n) _______________ address for a group of IPv6 network interfaces where each packet is delivered to each interface.
You should implement a(n) _______________ address for a group of IPv6 network interfaces where each packet is delivered to each interface.
What is the local loopback address in IPv6?
What is the local loopback address in IPv6?
Which file resolves NetBIOS names to IP addresses?
Which file resolves NetBIOS names to IP addresses?
Which data transmission method uses a private tunnel over a public network?
Which data transmission method uses a private tunnel over a public network?
Which two statements are true about Microsoft security zones?
Which two statements are true about Microsoft security zones?
1 Kbps equals
1 Kbps equals
10 Mbps equals
10 Mbps equals
1 Gbps equals
1 Gbps equals
1000 Kbps equals
1000 Kbps equals
E1 connections use 32 channels to obtain a top speed of ____________.
E1 connections use 32 channels to obtain a top speed of ____________.
How many T1 lines are used for a full T3 connection?
How many T1 lines are used for a full T3 connection?
An example of a physical _____ topology would be eight hubs connected to a single switch.
An example of a physical _____ topology would be eight hubs connected to a single switch.
In a star topology, a bad cable affects only ____ interfaces.
In a star topology, a bad cable affects only ____ interfaces.
In a star topology, failure of a central connectivity device ____________ bring down the entire network.
In a star topology, failure of a central connectivity device ____________ bring down the entire network.
In a star topology, a central connection point _____________ flexibility and scalability.
In a star topology, a central connection point _____________ flexibility and scalability.
A _______________ makes multiple physical switches appear as one logical switch.
A _______________ makes multiple physical switches appear as one logical switch.
_________________ is not limited to routers and is available on switches.
_________________ is not limited to routers and is available on switches.
Switches can use __________________ load balancing.
Switches can use __________________ load balancing.
Layer 2 switches use what to determine where to forward frames?
Layer 2 switches use what to determine where to forward frames?
If a ________ does not know where to forward a frame, it floods it out all ports.
If a ________ does not know where to forward a frame, it floods it out all ports.
A router is a device that functions primarily on what layer of the OSI model?
A router is a device that functions primarily on what layer of the OSI model?
Which IP address in a routing table signifies a default route?
Which IP address in a routing table signifies a default route?
Microwave ovens cannot cause ________________ in wired networks.
Microwave ovens cannot cause ________________ in wired networks.
________________ can cause EMI.
________________ can cause EMI.
_______________ can cause interference for wireless networks.
_______________ can cause interference for wireless networks.
What is the speed of a Cat5 port?
What is the speed of a Cat5 port?
What is the speed of a Cat3 port?
What is the speed of a Cat3 port?
What is the speed of a Cat5e port?
What is the speed of a Cat5e port?
What is the port for PPTP?
What is the port for PPTP?
What is the port for L2TP?
What is the port for L2TP?
What is the tunneling protocol used by MPPE?
What is the tunneling protocol used by MPPE?
What is the tunneling protocol used by IPsec?
What is the tunneling protocol used by IPsec?
What is the tunneling protocol for HTTPS?
What is the tunneling protocol for HTTPS?
What does a router connect?
What does a router connect?
What technology is used on Layer 1 of the OSI model to transmit data?
What technology is used on Layer 1 of the OSI model to transmit data?
Unsecured websites are accessed through port 80 by default.
Unsecured websites are accessed through port 80 by default.
Public websites are accessed through port 25.
Public websites are accessed through port 25.
Secured websites are accessed through port 443 by default.
Secured websites are accessed through port 443 by default.
What class is the IP address 100.100.1.1?
What class is the IP address 100.100.1.1?
What class is the IP address 170.100.1.5?
What class is the IP address 170.100.1.5?
What class is the IP address 198.126.1.55?
What class is the IP address 198.126.1.55?
What class is the IP address 244.0.0.2?
What class is the IP address 244.0.0.2?
Which record resolves hostnames to 128-bit IP addresses?
Which record resolves hostnames to 128-bit IP addresses?
What command deletes an IP address bound to an interface?
What command deletes an IP address bound to an interface?
What command acquires an IP address from a DHCP server?
What command acquires an IP address from a DHCP server?
Dhcp -release is NOT the command that deletes an IP address bound to an interface.
Dhcp -release is NOT the command that deletes an IP address bound to an interface.
Firewalls mainly use ____________ to filter data packets.
Firewalls mainly use ____________ to filter data packets.
Firewalls can be which types?
Firewalls can be which types?
Firewalls are sometimes set up on individual host machines.
Firewalls are sometimes set up on individual host machines.
What command is used to determine the path that an IP packet has taken to reach a destination?
What command is used to determine the path that an IP packet has taken to reach a destination?
If statistics showing the percentage of dropped packets are needed, what should be used instead of tracert?
If statistics showing the percentage of dropped packets are needed, what should be used instead of tracert?
Which command shows information on listening and established ports?
Which command shows information on listening and established ports?
Which command shows the same info but only for TCP connections?
Which command shows the same info but only for TCP connections?
RIP routing protocols calculates routes based on what?
RIP routing protocols calculates routes based on what?
What command is used to display the DNS cache?
What command is used to display the DNS cache?
What command is used to purge (get rid of) the DNS cache?
What command is used to purge (get rid of) the DNS cache?
Study Notes
IPsec and Network Protocols
- Encapsulating Security Payload (ESP): Provides both authentication and encryption in IPsec.
- Firewalls filter traffic primarily based on protocols and ports.
Network Connections
- Use full duplex connections for simultaneous data transmission on network adapters connecting to switches.
- T1 line offers a maximum throughput of 1.544 Mbps.
VPN and Leased Lines
- Site-to-Site VPNs are ideal for connecting two companies collaborating on a project.
- Examples of leased lines include DSL.
Wireless Standards
- 802.11ac routers are compatible with 802.11n (300 Mbps at 2.4/5 GHz) and 802.11a (54 Mbps at 5 GHz).
Wireless Networking Tools
- A wireless bridge connects different wireless networks, such as 802.11a, 802.11g, and 802.11n.
Network Topologies
- Ring topology connects computers in a circular layout.
- Mesh topology connects every computer directly to every other computer.
- Switch creates separate collision domains, allowing full duplex operations without collisions.
Server Roles and Network Cables
- Remote Access role on Windows Server 2016 enables routing.
- Single-mode fiber cables support the longest signal distances.
IP Addressing and Subnetting
- Use ipconfig /all to find a computer's MAC address.
- For 750 computers, a Class B IP address is recommended.
- A Class C network's subnet mask for 192.168.1.0 is 255.255.255.0.
IPv6 and Network Addresses
- Implement a multicast address for distributing packets to a group of IPv6 interfaces.
- The local loopback address in IPv6 is ::1.
Name Resolution
- LMHOSTS file resolves NetBIOS names to IP addresses.
VPNs and Security Protocols
- A VPN creates a private tunnel over public networks.
- Several tunneling protocols include PPTP, L2TP, and SSTP.
Ethernet and Port Specifications
- Ethernet operates on Layer 1 of the OSI model.
- Cat5 supports speeds of 100 Mbps, while Cat5e supports 1 Gbps.
- Unsecured websites typically use port 80, while secured ones use port 443.
Classful Addressing
- Class A example IP: 100.100.1.1; Class B example IP: 170.100.1.5; Class C example IP: 198.126.1.55; Class D example IP: 244.0.0.2.
DNS and IP Configuration Commands
- AAAA records map hostnames to IPv6 addresses.
- Commands related to IP address management include:
- ipconfig /release to delete an IP address.
- ipconfig /renew to acquire an IP address from DHCP.
- ipconfig /displaydns to show DNS cache.
- ipconfig /flushdns to purged DNS cache.
Tracing and Network Statistics
- tracert is used to trace the path of IP packets across a network.
- Use pathping to find packet loss statistics.
- netstat -a displays all listening and established ports, while netstat -p tcp shows info for TCP connections.
Routing Protocols
- RIP routing uses hop counts for route calculation, with a maximum of 15 hops.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on networking concepts with these flashcards from the MTA training course. Each card focuses on key protocols, filtering criteria, and connection types essential for network management. Perfect for preparing for your MTA certification!