Network Management and Structured Cabling
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary benefit of adhering to a structured cabling standard in network management?

  • It enables wireless connections without cables.
  • It eliminates the need for additional hardware.
  • It ensures consistency, reliability, and scalability. (correct)
  • It guarantees the highest potential data speeds.
  • How does using a structured cabling standard affect troubleshooting?

  • It solely relies on advanced software tools.
  • It complicates the troubleshooting process.
  • It makes troubleshooting less complex. (correct)
  • It has no significant impact on troubleshooting.
  • What role does structured cabling play in network expansion?

  • It facilitates easier integration of additional components. (correct)
  • It requires more manual configuration to expand.
  • It increases the overall latency of the network.
  • It restricts the number of devices that can connect.
  • Which of the following is NOT an advantage of using structured cabling standards?

    <p>Increased vulnerability to cable damage. (B)</p> Signup and view all the answers

    Why might a company choose to implement structured cabling standards over a more ad-hoc approach?

    <p>A structured standard provides benefits like reliability and scalability. (D)</p> Signup and view all the answers

    What is the first step in seeking approval for a network change in a large organization?

    <p>Utilizing a formal change management process (D)</p> Signup and view all the answers

    Which group is typically responsible for reviewing change requests in a large organization?

    <p>The change control board (B)</p> Signup and view all the answers

    What does a formal change request typically require in large organizations?

    <p>A detailed description of the proposed change (C)</p> Signup and view all the answers

    Which would likely be the least effective way to proceed with a network change request?

    <p>Submitting a change request without documentation (D)</p> Signup and view all the answers

    Why is it important to have a change control board in the change management process?

    <p>To evaluate and prioritize proposed changes (B)</p> Signup and view all the answers

    Flashcards

    Structured Cabling Standard

    A set of rules for installing and managing cabling systems, ensuring consistency, reliability, and scalability.

    Consistency in Cabling

    Using a standard ensures all cables are installed the same way, simplifying management and maintenance.

    Increased Reliability

    Standards minimize connection issues and reduce downtime, contributing to a reliable network.

    Scalability in Network Expansion

    Standards allow for easy expansion of your network without major changes in infrastructure.

    Signup and view all the flashcards

    Troubleshooting Made Easier

    A standardized system simplifies troubleshooting by providing clear pathways for signal flow.

    Signup and view all the flashcards

    Network Change Request

    A formal document that outlines the proposed network alteration, its impact, and justification for approval.

    Signup and view all the flashcards

    Change Management Process

    A structured approach for managing and controlling changes within an organization, ensuring they are planned, authorized, and implemented smoothly.

    Signup and view all the flashcards

    Change Control Board (CCB)

    A group of individuals responsible for reviewing and approving proposed network changes, ensuring they align with organizational policies and best practices.

    Signup and view all the flashcards

    Why is a formal process needed?

    Formal processes for network changes are crucial to maintain stability, minimize downtime, and protect against unauthorized alterations that could compromise security and performance.

    Signup and view all the flashcards

    Impact Assessment

    A crucial step in network change request review, where the potential consequences and disruption of the proposed change are carefully evaluated.

    Signup and view all the flashcards

    Study Notes

    Module 1

    • In the client-server model, HTTPS is the primary secure protocol for communication between a browser and a web server.
    • SSL and TLS are encryption protocols used to provide secure email transmissions.
    • Nginx is an application that can run a website from a server.
    • Establishing a plan of action to resolve a problem and identify potential effects prevents complications when making multiple changes to an application.
    • In the event of a fire, the most appropriate failure policy is fail-open.
    • A network with five computers, a switch, a router, and internet connection uses a peer-to-peer logical networking model.

    Module 2

    • In a client-server model, a network upgrade can allow that network a client-server capability.
    • A network topology with seven computers and a network printer all directly connected to a switch uses a star topology.
    • SQL is a language to pull relevant customer records from a database for marketing campaigns
    • RDP is an application layer protocol.
    • Windows Server 2019 uses an Active Directory database to store data about user access and network resources.
    • A layer 2 switch uses MAC addresses and functions at the data link layer, while a router utilizes IP addresses and functions at the network layer.
    • A node is any device on a network (including routers and switches), while a host specifically processes, generates, or receives network data.
    • A MAN covers a city or metropolitan area, while a WAN spans larger areas like cities, countries, or continents.
    • Two protocols that function in the OSI transport layer are TCP and UDP. They use port numbers to identify specific applications and services.

    Module 3

    • TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are transport layer protocols that add port numbers to their headers to identify services.
    • An IP address identifies the receiving host.
    • A MAC address identifies the receiving node within the data link layer. A network adapter operates at both the physical and data link layers.
    • Begin troubleshooting email issues using protocols at the application layer (Layer 7).
    • If a problem affects a large number of users and testing your theory doesn't solve the problem, escalate the issue to higher-level support.
    • A technician from an ISP should be taken to the IDF location to troubleshoot a weak WAN connection.

    Module 4

    • A layer 4 device uses the TCP header to read and process data.
    • The acknowledgement number in a TCP segment determines if data units match.
    • IP operates at the network layer of the OSI model.
    • The Internet standard MTU is 1500 bytes.
    • ICMP and ARP manage the neighbor discovery processes on IPv4 networks.
    • Use the arp -a command to map a MAC address to an IP address on a computer.
    • VDI offers access to multiple operating systems in virtual machines over RDS and VNC.
    • Encryption protocol IPsec ensures the security of transmissions.
    • The encryption benchmark ensuring data isn't modified during transmission and reception is integrity.
    • Remote file access protocol, SFTP, is an extension of SSH.
    • Three characteristics that distinguish TCP from UDP are a connection-oriented approach, reliable data transfers with ordered data flows, and flow control mechanisms.

    Module 5

    • Bandwidth is a transmission characteristic that can't be fully achieved.
    • NEXT (Near-End Crosstalk) is a type of crosstalk that occurs near the source of a signal.
    • STDM (Statistical Time Division Multiplexing) is a multiplexing method that assigns slots to nodes based on priority.
    • Active twinaxial cables are the best to use for ultra-high-speed connections between devices on the same rack.
    • Cat 5e, Cat 6a, and Cat 7 twisted pair cables support Gigabit Ethernet.
    • White/orange is the correct color for the first pin in government cables.
    • Cat 6a Ethernet cable is the earliest twisted-pair standard for 10 Gbps.
    • Fiber type mismatch is a problem when pairing a 50-micron core cable with a 62.5-micron core cable.

    Module 6

    • Layer 1 is the lowest network layer where wired and wireless transmissions share protocols.
    • RSSI (Received Signal Strength Indicator) measures the edges of a dead network zone.
    • IR (Infrared) wireless transmission requires a clear line of sight (LOS) to function.
    • Z-Wave doesn't use the 2.4 GHz band.
    • Encryption securely transmits WPA/WPA2 data.
    • CCMP replaced TKIP in WPA2.
    • 802.11ax operates on both 2.4 and 5GHz bands.

    Module 7

    • A hypervisor manages VMs.
    • A virtual switch operates at the data link layer.
    • A load balancer manages traffic on multiple servers in a cluster.
    • Network connection that a VM uses to receive IP address information is NAT mode.
    • ToR switch connects all devices in a rack to the network.
    • PaaS is a Cloud service model for software testing.
    • MTBF is the average time a router/device is functional.
    • A MAC address is used to restrict access to a switch interface.
    • A network connection between a switch and server that isn't improved by link aggregation is speed.
    • The cloud management technique that executes a series of tasks is orchestration.
    • A VPN, direct connect, and Internet connections are methods to connect to cloud resources.
    • A virtual IP address (VIP) is useful for load balancing and network access control.

    Module 8

    • A class A IP address uses 24 bits for host information.
    • The formula to calculate the number of possible hosts on a network is 2^h - 2, where h is the number of host bits.
    • 9 bits are the max borrowable bits for a class B subnet mask with at least 130 hosts per subnet.
    • Well-chosen subnets aid in simplifying network documentation and management.
    • A magic number can be calculated using either 256 minus the interest octet or 2^h-2.
    • The fourth hexadecimal block in IPv6 refers to the Subnet ID.
    • A RADIUS server is a requirement for dynamic VLAN assignment.
    • A trunk port enables traffic for multiple VLANs.
    • The IEEE standard for how VLANs operate on a network is 802.1Q.
    • 172.16.32.0/24 is the network ID with CIDR notation for the IP address 172.16.32.108 and subnet mask 255.255.255.0.
    • 120.10.10.0/25 is the CIDR notation with subnet mask 255.255.255.128 used to sublease half of the class C network 120.10.10.0.
    • Subnetting occurs at the network layer. VLANS operate at the data link layer.

    Module 9

    • The network layer directs traffic between one LAN to another.
    • The kind of route created when a router is configured to use a specific path is a static route.
    • When a router can't determine a path for a message, it sends it to its gateway of last resort.
    • Router protocol reliability and priority rating is done with administrative distance.
    • BGP is used by an edge router for pathing data across the Internet.
    • LANs and WANs operate at the Layer 2 protocol level.
    • The device used to monitor a WAN connection without interpreting data is a Smartjack.
    • The standard for definitions of cable broadband is DOCSIS.
    • GSM networks use TDMA (Time Division Multiple Access) for data channel separations.
    • LTE-A is the fastest cellular technology. MPLS label is inserted into the message headers located between Layer 2 and 3 sections.
    • A router performs tasks such as connecting dissimilar networks, interpreting addressing, determining the best path, and rerouting if the primary path fails.
    • The route determination database used by the router is the routing table.

    Module 10

    • A security audit can be used to determine priorities for a network security upgrade, as well as other procedures.
    • A company might implement a BYOD policy because it can be cost-effective and increase employee morale.
    • A rogue AP may broadcast a name of a smartphone to act as a threat to a company's network.
    • A trap when connecting a smartphone to Wi-fi can be an "evil twin".
    • Two antennas are needed to exchange information by tuning to the same frequency.
    • The 4 addresses in an 802.11 frame (source, destination, BSSID, and receiving) are not contained in an 802.3 frame.
    • When a wireless device encounters a large obstacle, the signal gets reflected.
    • A properly configured network with multiple wireless comm systems will demonstrate a lower signal-to-noise ratio.
    • WPA2-Personal and WPA2-Enterprise are both implemented on a network but use a RADIUS server for WPA2-Enterprise authentication.
    • Widespread network outages can be identified as a network disaster.
    • A network signal suffers throughput reduction due to interference, distance, and physical obstructions.

    Module 11

    • Proxy servers operate at the Application layer (Layer 7).
    • The access-list command permits web-browsing traffic from any IP address with a particular protocol identifier to any IP address.
    • A packet-filtering firewall does not use application data during determining whether to accept or deny traffic.
    • An Intrusion Detection System (IDS) uses message information like signatures to recognize network threats.
    • A separation of duties principle should be used to perform auditing functions on network activity.
    • The cloud provider is responsible for the security of the public cloud hardware.
    • A RADIUS server and TACACS+ are used for administration protocols.
    • The network device an attacker may use to make clients use an illegitimate gateway is a switch.

    Module 12

    • A TCP monitor tool, like Wireshark, is useful to examine TCP messages between a client and a server while troubleshooting.
    • Top talkers are those network devices whose activity is high on a network monitor during a specific period.
    • The command for requesting the next record in an SNMP log is SNMP Get Next.
    • SNMP agents listen on port 161.
    • A router's configuration changes will persist after a restart if the configuration's running-config is written to the startup-config.
    • A router will typically use a routing table to determine efficient methods for message delivery. A splitter is needed for DSL phone protection.
    • Traffic shaping is one congestion control technique.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    All Review Questions PDF

    Description

    This quiz focuses on the benefits and processes related to structured cabling standards in network management. It covers aspects such as troubleshooting, network expansion, and the formalities of change requests in large organizations. Assess your understanding of how structured cabling influences network efficiency and management practices.

    More Like This

    Cableado Estructurado y Redes
    10 questions
    Structured Cabling Systems
    10 questions

    Structured Cabling Systems

    EffortlessHurdyGurdy avatar
    EffortlessHurdyGurdy
    NORMATIVES I ESTÀNDARDS DELS SCE
    13 questions
    Netzwerktechnologien und Verkabelung
    15 questions
    Use Quizgecko on...
    Browser
    Browser