Podcast
Questions and Answers
What is a primary benefit of adhering to a structured cabling standard in network management?
What is a primary benefit of adhering to a structured cabling standard in network management?
How does using a structured cabling standard affect troubleshooting?
How does using a structured cabling standard affect troubleshooting?
What role does structured cabling play in network expansion?
What role does structured cabling play in network expansion?
Which of the following is NOT an advantage of using structured cabling standards?
Which of the following is NOT an advantage of using structured cabling standards?
Signup and view all the answers
Why might a company choose to implement structured cabling standards over a more ad-hoc approach?
Why might a company choose to implement structured cabling standards over a more ad-hoc approach?
Signup and view all the answers
What is the first step in seeking approval for a network change in a large organization?
What is the first step in seeking approval for a network change in a large organization?
Signup and view all the answers
Which group is typically responsible for reviewing change requests in a large organization?
Which group is typically responsible for reviewing change requests in a large organization?
Signup and view all the answers
What does a formal change request typically require in large organizations?
What does a formal change request typically require in large organizations?
Signup and view all the answers
Which would likely be the least effective way to proceed with a network change request?
Which would likely be the least effective way to proceed with a network change request?
Signup and view all the answers
Why is it important to have a change control board in the change management process?
Why is it important to have a change control board in the change management process?
Signup and view all the answers
Flashcards
Structured Cabling Standard
Structured Cabling Standard
A set of rules for installing and managing cabling systems, ensuring consistency, reliability, and scalability.
Consistency in Cabling
Consistency in Cabling
Using a standard ensures all cables are installed the same way, simplifying management and maintenance.
Increased Reliability
Increased Reliability
Standards minimize connection issues and reduce downtime, contributing to a reliable network.
Scalability in Network Expansion
Scalability in Network Expansion
Signup and view all the flashcards
Troubleshooting Made Easier
Troubleshooting Made Easier
Signup and view all the flashcards
Network Change Request
Network Change Request
Signup and view all the flashcards
Change Management Process
Change Management Process
Signup and view all the flashcards
Change Control Board (CCB)
Change Control Board (CCB)
Signup and view all the flashcards
Why is a formal process needed?
Why is a formal process needed?
Signup and view all the flashcards
Impact Assessment
Impact Assessment
Signup and view all the flashcards
Study Notes
Module 1
- In the client-server model, HTTPS is the primary secure protocol for communication between a browser and a web server.
- SSL and TLS are encryption protocols used to provide secure email transmissions.
- Nginx is an application that can run a website from a server.
- Establishing a plan of action to resolve a problem and identify potential effects prevents complications when making multiple changes to an application.
- In the event of a fire, the most appropriate failure policy is fail-open.
- A network with five computers, a switch, a router, and internet connection uses a peer-to-peer logical networking model.
Module 2
- In a client-server model, a network upgrade can allow that network a client-server capability.
- A network topology with seven computers and a network printer all directly connected to a switch uses a star topology.
- SQL is a language to pull relevant customer records from a database for marketing campaigns
- RDP is an application layer protocol.
- Windows Server 2019 uses an Active Directory database to store data about user access and network resources.
- A layer 2 switch uses MAC addresses and functions at the data link layer, while a router utilizes IP addresses and functions at the network layer.
- A node is any device on a network (including routers and switches), while a host specifically processes, generates, or receives network data.
- A MAN covers a city or metropolitan area, while a WAN spans larger areas like cities, countries, or continents.
- Two protocols that function in the OSI transport layer are TCP and UDP. They use port numbers to identify specific applications and services.
Module 3
- TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are transport layer protocols that add port numbers to their headers to identify services.
- An IP address identifies the receiving host.
- A MAC address identifies the receiving node within the data link layer. A network adapter operates at both the physical and data link layers.
- Begin troubleshooting email issues using protocols at the application layer (Layer 7).
- If a problem affects a large number of users and testing your theory doesn't solve the problem, escalate the issue to higher-level support.
- A technician from an ISP should be taken to the IDF location to troubleshoot a weak WAN connection.
Module 4
- A layer 4 device uses the TCP header to read and process data.
- The acknowledgement number in a TCP segment determines if data units match.
- IP operates at the network layer of the OSI model.
- The Internet standard MTU is 1500 bytes.
- ICMP and ARP manage the neighbor discovery processes on IPv4 networks.
- Use the
arp -a
command to map a MAC address to an IP address on a computer. - VDI offers access to multiple operating systems in virtual machines over RDS and VNC.
- Encryption protocol IPsec ensures the security of transmissions.
- The encryption benchmark ensuring data isn't modified during transmission and reception is integrity.
- Remote file access protocol, SFTP, is an extension of SSH.
- Three characteristics that distinguish TCP from UDP are a connection-oriented approach, reliable data transfers with ordered data flows, and flow control mechanisms.
Module 5
- Bandwidth is a transmission characteristic that can't be fully achieved.
- NEXT (Near-End Crosstalk) is a type of crosstalk that occurs near the source of a signal.
- STDM (Statistical Time Division Multiplexing) is a multiplexing method that assigns slots to nodes based on priority.
- Active twinaxial cables are the best to use for ultra-high-speed connections between devices on the same rack.
- Cat 5e, Cat 6a, and Cat 7 twisted pair cables support Gigabit Ethernet.
- White/orange is the correct color for the first pin in government cables.
- Cat 6a Ethernet cable is the earliest twisted-pair standard for 10 Gbps.
- Fiber type mismatch is a problem when pairing a 50-micron core cable with a 62.5-micron core cable.
Module 6
- Layer 1 is the lowest network layer where wired and wireless transmissions share protocols.
- RSSI (Received Signal Strength Indicator) measures the edges of a dead network zone.
- IR (Infrared) wireless transmission requires a clear line of sight (LOS) to function.
- Z-Wave doesn't use the 2.4 GHz band.
- Encryption securely transmits WPA/WPA2 data.
- CCMP replaced TKIP in WPA2.
- 802.11ax operates on both 2.4 and 5GHz bands.
Module 7
- A hypervisor manages VMs.
- A virtual switch operates at the data link layer.
- A load balancer manages traffic on multiple servers in a cluster.
- Network connection that a VM uses to receive IP address information is NAT mode.
- ToR switch connects all devices in a rack to the network.
- PaaS is a Cloud service model for software testing.
- MTBF is the average time a router/device is functional.
- A MAC address is used to restrict access to a switch interface.
- A network connection between a switch and server that isn't improved by link aggregation is speed.
- The cloud management technique that executes a series of tasks is orchestration.
- A VPN, direct connect, and Internet connections are methods to connect to cloud resources.
- A virtual IP address (VIP) is useful for load balancing and network access control.
Module 8
- A class A IP address uses 24 bits for host information.
- The formula to calculate the number of possible hosts on a network is 2^h - 2, where h is the number of host bits.
- 9 bits are the max borrowable bits for a class B subnet mask with at least 130 hosts per subnet.
- Well-chosen subnets aid in simplifying network documentation and management.
- A magic number can be calculated using either 256 minus the interest octet or 2^h-2.
- The fourth hexadecimal block in IPv6 refers to the Subnet ID.
- A RADIUS server is a requirement for dynamic VLAN assignment.
- A trunk port enables traffic for multiple VLANs.
- The IEEE standard for how VLANs operate on a network is 802.1Q.
- 172.16.32.0/24 is the network ID with CIDR notation for the IP address 172.16.32.108 and subnet mask 255.255.255.0.
- 120.10.10.0/25 is the CIDR notation with subnet mask 255.255.255.128 used to sublease half of the class C network 120.10.10.0.
- Subnetting occurs at the network layer. VLANS operate at the data link layer.
Module 9
- The network layer directs traffic between one LAN to another.
- The kind of route created when a router is configured to use a specific path is a static route.
- When a router can't determine a path for a message, it sends it to its gateway of last resort.
- Router protocol reliability and priority rating is done with administrative distance.
- BGP is used by an edge router for pathing data across the Internet.
- LANs and WANs operate at the Layer 2 protocol level.
- The device used to monitor a WAN connection without interpreting data is a Smartjack.
- The standard for definitions of cable broadband is DOCSIS.
- GSM networks use TDMA (Time Division Multiple Access) for data channel separations.
- LTE-A is the fastest cellular technology. MPLS label is inserted into the message headers located between Layer 2 and 3 sections.
- A router performs tasks such as connecting dissimilar networks, interpreting addressing, determining the best path, and rerouting if the primary path fails.
- The route determination database used by the router is the routing table.
Module 10
- A security audit can be used to determine priorities for a network security upgrade, as well as other procedures.
- A company might implement a BYOD policy because it can be cost-effective and increase employee morale.
- A rogue AP may broadcast a name of a smartphone to act as a threat to a company's network.
- A trap when connecting a smartphone to Wi-fi can be an "evil twin".
- Two antennas are needed to exchange information by tuning to the same frequency.
- The 4 addresses in an 802.11 frame (source, destination, BSSID, and receiving) are not contained in an 802.3 frame.
- When a wireless device encounters a large obstacle, the signal gets reflected.
- A properly configured network with multiple wireless comm systems will demonstrate a lower signal-to-noise ratio.
- WPA2-Personal and WPA2-Enterprise are both implemented on a network but use a RADIUS server for WPA2-Enterprise authentication.
- Widespread network outages can be identified as a network disaster.
- A network signal suffers throughput reduction due to interference, distance, and physical obstructions.
Module 11
- Proxy servers operate at the Application layer (Layer 7).
- The access-list command permits web-browsing traffic from any IP address with a particular protocol identifier to any IP address.
- A packet-filtering firewall does not use application data during determining whether to accept or deny traffic.
- An Intrusion Detection System (IDS) uses message information like signatures to recognize network threats.
- A separation of duties principle should be used to perform auditing functions on network activity.
- The cloud provider is responsible for the security of the public cloud hardware.
- A RADIUS server and TACACS+ are used for administration protocols.
- The network device an attacker may use to make clients use an illegitimate gateway is a switch.
Module 12
- A TCP monitor tool, like Wireshark, is useful to examine TCP messages between a client and a server while troubleshooting.
- Top talkers are those network devices whose activity is high on a network monitor during a specific period.
- The command for requesting the next record in an SNMP log is
SNMP Get Next
. - SNMP agents listen on port 161.
- A router's configuration changes will persist after a restart if the configuration's running-config is written to the startup-config.
- A router will typically use a routing table to determine efficient methods for message delivery. A splitter is needed for DSL phone protection.
- Traffic shaping is one congestion control technique.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz focuses on the benefits and processes related to structured cabling standards in network management. It covers aspects such as troubleshooting, network expansion, and the formalities of change requests in large organizations. Assess your understanding of how structured cabling influences network efficiency and management practices.