Podcast
Questions and Answers
What is the length of an IPv6 address?
What is the length of an IPv6 address?
- 128 bytes
- 32 bits
- 128 bits (correct)
- 64 bits
What type of transmission do modems typically use?
What type of transmission do modems typically use?
- Timed interval
- Asynchronous (correct)
- Synchronous
- PPP
Which device can be connected to a 15-pin female connector with pins in two rows?
Which device can be connected to a 15-pin female connector with pins in two rows?
- Video device
- Joystick (correct)
- Parallel device
- Serial device
- MIDI device
What type of peripheral is a 34-pin connection on an I/O card typically used for?
What type of peripheral is a 34-pin connection on an I/O card typically used for?
Which issue is most likely indicated by the absence of a beep during a PC boot sequence?
Which issue is most likely indicated by the absence of a beep during a PC boot sequence?
Which WLAN IEEE specification allows for data transfer rates up to 54Mbps at 2.4GHz?
Which WLAN IEEE specification allows for data transfer rates up to 54Mbps at 2.4GHz?
Given the IP address 192.168.168.188 and subnet mask 255.255.255.192, what is the valid host range for the subnet?
Given the IP address 192.168.168.188 and subnet mask 255.255.255.192, what is the valid host range for the subnet?
To create a backup of an IOS image on a Cisco device, which command is used?
To create a backup of an IOS image on a Cisco device, which command is used?
Which protocol is used by PPP to identify the Network layer protocol during connection establishment?
Which protocol is used by PPP to identify the Network layer protocol during connection establishment?
Which command is used to set a Telnet password on a Cisco router?
Which command is used to set a Telnet password on a Cisco router?
Which transport layer protocol does DHCP use for its operations?
Which transport layer protocol does DHCP use for its operations?
What command is used on Cisco devices to determine if an IP access list is enabled on an interface?
What command is used on Cisco devices to determine if an IP access list is enabled on an interface?
In the OSI model, where is a hub specified to operate?
In the OSI model, where is a hub specified to operate?
What is the effect of the passive
command when applied to dynamic routing protocols on a Cisco router?
What is the effect of the passive
command when applied to dynamic routing protocols on a Cisco router?
Which protocol is used to send a destination network unreachable message back to the originating host?
Which protocol is used to send a destination network unreachable message back to the originating host?
How often are Bridge Protocol Data Units (BPDUs) sent by a layer 2 device by default?
How often are Bridge Protocol Data Units (BPDUs) sent by a layer 2 device by default?
How many broadcast domains are created when a network is segmented using a 12-port switch?
How many broadcast domains are created when a network is segmented using a 12-port switch?
On a Cisco router, what does the command routerA(config)#line con 0
allow you to configure next?
On a Cisco router, what does the command routerA(config)#line con 0
allow you to configure next?
Which command allows you to view the entire contents of all access lists configured on a Cisco router?
Which command allows you to view the entire contents of all access lists configured on a Cisco router?
Which class of IP address, by default, provides the largest number of host addresses?
Which class of IP address, by default, provides the largest number of host addresses?
In a network with multiple switches implementing spanning tree protocol, how many root bridges would you typically have?
In a network with multiple switches implementing spanning tree protocol, how many root bridges would you typically have?
Which PPP protocol is responsible for dynamic addressing, authentication and multilink?
Which PPP protocol is responsible for dynamic addressing, authentication and multilink?
What defines a stub network in network topology?
What defines a stub network in network topology?
If a Cisco router connects to a CSU/DSU, which command is required to configure a serial interface for a 64000bps link?
If a Cisco router connects to a CSU/DSU, which command is required to configure a serial interface for a 64000bps link?
Which statement accurately describes VLANs (Virtual LANs) in a Cisco switching environment?
Which statement accurately describes VLANs (Virtual LANs) in a Cisco switching environment?
What is the primary function of a VLAN in a Layer 2 network?
What is the primary function of a VLAN in a Layer 2 network?
What was the main motivation behind the creation of the OSI model?
What was the main motivation behind the creation of the OSI model?
How many collision domains are created when segmenting a network with a 12-port switch?
How many collision domains are created when segmenting a network with a 12-port switch?
Which command on a Cisco router displays line protocol, DLCI, and LMI information for a Frame Relay interface?
Which command on a Cisco router displays line protocol, DLCI, and LMI information for a Frame Relay interface?
Which protocol does the ping
utility use to send echo requests?
Which protocol does the ping
utility use to send echo requests?
Which command is used to upgrade the IOS (Internetwork Operating System) on a Cisco router?
Which command is used to upgrade the IOS (Internetwork Operating System) on a Cisco router?
If you need to delete the configuration stored in NVRAM on a Cisco router, which command should you use?
If you need to delete the configuration stored in NVRAM on a Cisco router, which command should you use?
Which protocols are used to configure trunking on a switch?
Which protocols are used to configure trunking on a switch?
Which of the following services use the TCP transport protocol?
Which of the following services use the TCP transport protocol?
Which layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
Which layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
Which statements are true regarding the Transport layer in the TCP/IP stack?
Which statements are true regarding the Transport layer in the TCP/IP stack?
Which protocol is typically implemented to automate IP configuration, including the IP address, subnet mask, default gateway, and DNS information?
Which protocol is typically implemented to automate IP configuration, including the IP address, subnet mask, default gateway, and DNS information?
Which of the following IP addresses is considered a private IP address?
Which of the following IP addresses is considered a private IP address?
Which mechanism allows a router to respond to ARP requests intended for a remote hosts?
Which mechanism allows a router to respond to ARP requests intended for a remote hosts?
In the DoD model, which layer is equivalent to the Network layer of the OSI model?
In the DoD model, which layer is equivalent to the Network layer of the OSI model?
Flashcards
IPv6 Address Length
IPv6 Address Length
128 bits
Asynchronous Transmission
Asynchronous Transmission
A transmission method where data bits are sent with irregular time intervals, using start and stop bits.
15 Pin Female Connector
15 Pin Female Connector
Connects with Serial device or video device.
34-Pin I/O Connection
34-Pin I/O Connection
Signup and view all the flashcards
No Beep on PC Boot
No Beep on PC Boot
Signup and view all the flashcards
WLAN IEEE 802.11g
WLAN IEEE 802.11g
Signup and view all the flashcards
Valid Host Range
Valid Host Range
Signup and view all the flashcards
IOS Backup Command
IOS Backup Command
Signup and view all the flashcards
PPP's Protocol Usage
PPP's Protocol Usage
Signup and view all the flashcards
Set Telnet Password
Set Telnet Password
Signup and view all the flashcards
DHCP Transport Protocol
DHCP Transport Protocol
Signup and view all the flashcards
IP Access List Command
IP Access List Command
Signup and view all the flashcards
Hub's OSI Model Layer
Hub's OSI Model Layer
Signup and view all the flashcards
Passive Command Function
Passive Command Function
Signup and view all the flashcards
Destination Network Protocol
Destination Network Protocol
Signup and view all the flashcards
BPDU Sending Frequency
BPDU Sending Frequency
Signup and view all the flashcards
Broadcast Domains
Broadcast Domains
Signup and view all the flashcards
Console Line Command
Console Line Command
Signup and view all the flashcards
View Access List Command
View Access List Command
Signup and view all the flashcards
IP Address Class
IP Address Class
Signup and view all the flashcards
Root Bridges in Network
Root Bridges in Network
Signup and view all the flashcards
PPP Protocol Benefits
PPP Protocol Benefits
Signup and view all the flashcards
Stub Network Definition
Stub Network Definition
Signup and view all the flashcards
Command for CSU/DSU
Command for CSU/DSU
Signup and view all the flashcards
VLANs
VLANs
Signup and view all the flashcards
VLAN Function
VLAN Function
Signup and view all the flashcards
OSI Model Creation Reason
OSI Model Creation Reason
Signup and view all the flashcards
Interface Command
Interface Command
Signup and view all the flashcards
Ping Protocol
Ping Protocol
Signup and view all the flashcards
Upgrade IOS command
Upgrade IOS command
Signup and view all the flashcards
Delete NVRAM startup type
Delete NVRAM startup type
Signup and view all the flashcards
Configuring Trunking
Configuring Trunking
Signup and view all the flashcards
TCP Services
TCP Services
Signup and view all the flashcards
OSI Model layer
OSI Model layer
Signup and view all the flashcards
Compose a signature
Compose a signature
Signup and view all the flashcards
To provide level security
To provide level security
Signup and view all the flashcards
for the site. (Folders)
for the site. (Folders)
Signup and view all the flashcards
are based on the databaed
are based on the databaed
Signup and view all the flashcards
Study Notes
Network Fundamentals and Addressing
- IPv6 addresses are 128 bits long
- A modem uses asynchronous transmission.
- A 15-pin female connector in two rows is typically used for a joystick.
- A 34-pin connection on an I/O card interfaces with a floppy drive.
- The IEEE 802.11g WLAN specification allows speeds up to 54Mbps at 2.4GHz.
- For an IP address of 192.168.168.188 with a subnet mask of 255.255.255.192, the valid host range is 192.168.168.129-190.
- PPP uses Network Control Protocol (NCP) to identify the Network layer protocol.
- DHCP uses the User Datagram Protocol (UDP) at the Transport layer.
- A hub operates at the Physical layer of the OSI model.
Router and Switch Commands
- "copy flash tftp" command is used to back up an IOS.
- "line vty 0 4" command is used to set a Telnet password on a Cisco router.
- "show ip interface" command determines if an IP access list is enabled on an interface.
- The "passive" command stops an interface from sending periodic dynamic updates but still allows receiving updates.
- ICMP (Internet Control Message Protocol) is used to send a destination network unknown message back to originating hosts.
- BPDU's are sent every 2 seconds from a layer 2 device
- Segmenting a network with a 12-port switch creates 12 collision domains
- The "routerA(config)#line cons 0" command allows you to set your console password.
- The "show access-lists" command displays the contents of all access lists.
- In a network with multiple switches, there is usually 1 root bridge.
- The "debug ip rip" command displays RIP routing updates.
- AAA refers to dynamic addressing, authentication and multilink that's provided by the PPP Protocol.
- A stub network has only one entry and exit point.
- The command "RouterA(config-if)#clock rate 64000" is needed to provide the router with a 64000bps serial link.
- Typing "Router#sh ru" results in an ambiguous command error because there is more than one show command that starts with the letters "ru".
- By default, a Cisco router supports 5 simultaneous Telnet sessions.
- The command "show interfaces" displays the configurable parameters and statistics of all interfaces on a router.
- The command "Router(config)#line vty 0 4" configures all the default VTY ports on a router.
- The command "show interfaces" is used to find the broadcast address used on a LAN on a router from user mode.
- The command "erase startup" will delete the contents of NVRAM on a router.
- The "Ctrl+C" keystroke will terminate setup mode.
- The "Router#copy run startup" command saves the configuration stored in RAM to NVRAM.
- The "banner motd" command is used to display a message to administrators when logging into the router.
- If a routing table has a static, a RIP, and an IGRP route to the same network, the static route will be used by default to route packets.
- The command "ip access-group 101 in" applies an access list to a router interface.
- A standard IP access list example is: access-list 1 deny 172.16.10.1 0.0.0.0
- By default, the "show interface serial 1" command indicates a problem in the Physical layer if the output shows "Serial1 is down, line protocol is down".
- If you want to delete the configuration stored in NVRAM, you would enter the command: "erase startup"
- Protocols "802.1Q" and "ISL" are used to configure trunking on a switch.
- The TCP services are SMTP and HTTP.
Network Protocols and Concepts
- When you store your group list in a personal address book, it is your responsibility to keep them up to date.
- Internet is a worldwide collection of computer networks and gateways.
- Computers use protocols to communicate with one another.
- The Internet browser displays images and text.
- Dial-up networking allows you to connect to a network using a modem.
- Class A addresses are assigned to networks designed for a very large number of hosts.
- The command "Router(config-router)# passive-interface s0" is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates.
- A private IP address is 192.168.24.43
- Proxy ARP allows a router to respond to an ARP request for a remote host.
- The Internet layer is equivalent to the Network layer of the OSI model in the DoD model.
- UDP is used by the following services DHCP, SNMP, and TFTP.
- Class C provides a maximum of 254 host addresses per network ID.
- FTP and Telnet use the Application layer to transmit data on the highest level
- The decimal and hexadecimal equivalents of the binary number 10011101 are 157 and 0x9D.
- The following statements are true regarding ICMP packets.
- They can provide hosts with information about network problems
- They are encapsulated within IP datagrams
- PPP stands for Point to Point protocol.
- The Outlook Today feature in Microsoft Outlook appoints for the next 5 days and include task that are over due
- Transmission Control Protocol (TCP) is used for a Telnet connection where it's being a layer 4 protocol.
- The four layers in the TCP/IP model is Application, Transport, Internet, and Physical
- ICMP can provide hosts with information about network problems and it is encapsulated within IP datagrams.
- The Virtual Private Network creates private networks across the Internet by enabling privacy and tunneling of non-TCP/IP protocols.
- A firewall provides a high level of security for a network.
- Erase startup will wipe the contents of the NVRAM and also put the router into setup mode.
- B class IP address has the most host addresses available by default.
- VLANs break up broadcast domains in a layer 2 switch internetwork.
- In a LAN network, Class C addresses are used.
- "110" - The three high order bits in a class C address are always set to binary.
- There are 2 types of Hub and it connects 3 major categories of cables that connect the networks.
- The ATM stands for Asynchronous Transfer Mode
- The "5" from - "The Internet community has 5 type of IP address" - implies the class full from A to E
TCP/IP and OSI Model
- Transport layer is equivalent of host-to-host in the TCP/IP model and the OSI model. Host is a connection orientated and not an application.
- For an IP addressing and information to be completed in a mechanism. DHCP is the best protocol to select to finish this.
- Domain Name System (DNS) uses TCP and UDP
- 10xxxXXX is the address range of a Class B network address in binary -The most likely command that sets the enable secret password to Cisco, is enable secret Cisco
- The commands "show interfaces," "show ip interface," and "show protocols" will display to the current IP addressing and the layer 1 and 2 status of an interface
- There are no host bits used in multicast operations.
Outlook and System Administration in Windows NT
- Offline Address Book is a list of recipient addresses that can be downloaded to a client computer.
- You can give others access to your web presentation by publishing it to a designated server
- The virtual private network is the VPN acronym
- The maximum transfer retry is 2
- "Global Address" - The global address list contains the names and emails.
- You can check to send and receive with faxes using computer
- The modem is an analog signal that can be converted to a digital and be signed
- Faxes are not installed on "window set up" by default.
- Virtual Private Network (VPN) creates secure, private networks across a public network, such as the Internet.
- The Global Address List automatically contains the entries in your Contacts folder in the Corporate/Workgroups configuration.
- Creating a New E-Mail Address in Address Book, you'll click on File and then on the new contact function if you are using this option.
- "Spin Box" if you are automatically recording to a contact or manually regarding the phone calls and other aspects - you'll be in control of it from contact.
- All aspects of a "hidden" outlook dialog is to keep tabs and the system'll still be able to track progress, even when boxes are being ticked.
- The "voting" function helps track the delivery through the check box within the message options through Outlook.
- You'll find the "To do" with the list of options that helps take the work task adding to track of new dimensions and adding the track progress.
- The "Actual Box" - to change the percentage, either to increase or decrease the percentage within an active state of progress.
- In network systems, class A addresses are used for networks with very high number of hosts.
- Each IP address requires 2 different TP addresses where parameters are considered.
- Flash - BIOS usually needs to be stored in an eery that often gets the job done with memory
- The default view in task having the options for columns with 4 options
File Management and System Tools
- "Performance" is important and to improve whenever server runs files that has multiple drives
- To a database, to write to the the database engine will firstly write to an actual Transaction Log file.
- You Can make data and log files reside on different drives for better over Performance.
- The LAN is a general, class C to address, and connect to a class C, and generally connects to a 2 way method.
- "NTFS" with "Window NT" is always the best file system but it only supports for window NT operating system (because for any new support system it also implements a new feature.
- Disk makes sure all parameters are set properly with the communication in (communication) -There are 2 types that can be used from the network, which covers and supports each device.
- Always leave at 0.0.0.0 window to leave IP addresses with the technical support CSV stands for Comma Separated Value
Network Hardware and Topologies
- The NIC is the network interface connector device
- Select the "protocol" within a select point "to point" in settings - select "next" under "protocol" which helps select what kind for the connection within serial line.
- Ensure that a proper amount (32 to 48 MB of RAM) is supplied with the window
- The "Noise" can increase for the cable connection with the cable length increases.
- There 2 types from each "TP address", also with that in mind that (128 MB or RAM) is required from the "Windows NT operation"
- The common protocol in computer that allows a fast data in files is the "computer".
Troubleshooting
- If you are using Telnet or FTP, the Application layer is the highest for data transmitting.
- If the outlook is slow, try the "defragmenter" to improve the performance
- High is the level of security on a network with a purpose of firewall in high security is being used for the right reasons when the device is in operation.
- An exchange server is used for an MS office with outlook.
- "Mailbox home" is home for all the data for an exchange server.
Exchange Server
- Core components of exchange servers are the services - running on window.
- Location transparency is the called for users that are not to be concerned with the data, simply to focus on the accessibility of a folder. Folders are stored as exchange servers.
- 5 MB is transaction log file can store in MS exchange.
- The DS (Information Store directory) is a is a list of names you can select addresses from.
Network Security and Access
- The most common protocols that uses Appication layer of the OSI model are Telnet, FTP, and TFTP.
- Proxies are often used in place of preventing traffic to passing directly between (networks) and provides security from the (bandwidth) using application
- All exchange data, such as messages and directory information, is stored in various Data base files
- There are no "Host bits" that are working for a D class - it is a reserved multicast operations system
- "Two" The number of that "TP address" has
Miscellaneous
- "MTA component" is "NOT" additional (optional) in exchange server system, it is a "required".
- A server needs to have multiple for a data to be running within the correct drives.
- With database engine - the most fastest version will be the best support system for the engine and that 32 is the most accurate one to use.
- Most permission are in the next hierarchy to which created (higher in the lever)
- Directory Replication (DR) is a set for each systems
Wireless Standards
- At 2.4GHz, the frequency range of an IEEE 802.11b. Also it follows the IEEE 802.11b - At "2.4GHz"
"Lower Right Corner" is an option to select to customize the Outlook Todays options.
"Outlook 2000" is a flexible environment and can be used "business" or "personal".
- mail merge helper can create form letters and labels, and can also mail the items for the sender
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.