Networking Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which scenario poses the greatest risk to computers, laptops, and networking equipment?

  • Dust accumulation
  • Electrostatic discharge (correct)
  • High humidity levels
  • Fluctuations in ambient temperature

Which of the following is the primary differentiating factor between a network switch and a network bridge?

  • A switch can support multiple network boundaries, while a bridge typically supports only one
  • A switch uses a routing table to forward traffic, while a bridge uses a forwarding table
  • A switch operates at Layer 3 while a bridge operates at Layer 2
  • A switch has higher port density compared to a bridge (correct)

If a network technician is unable to access a website, what is the first physical element they should verify?

  • Connectivity to the DNS server
  • The configuration of the default gateway
  • The network cable connecting their device (correct)
  • The status of the DHCP server

What critical settings are essential for configuring a PC to operate on a Local Area Network (LAN)?

<p>IP address and subnet mask (B)</p> Signup and view all the answers

Which OSI model layer incorporates the Physical, Data Link, and Network layers when mapping to the TCP/IP model?

<p>Network Access (D)</p> Signup and view all the answers

A network administrator wants to implement a protocol that dynamically assigns IP addresses, subnet masks, and gateway addresses to client computers. Which protocol fulfills this requirement?

<p>DHCP (C)</p> Signup and view all the answers

A network administrator is troubleshooting connectivity issues for a customer who cannot print to a shared network printer. Which of the following configurations is most likely to be misconfigured?

<p>Incorrect Default Gateway (A)</p> Signup and view all the answers

A network technician suspects a connectivity issue between a local network and an Internet Service Provider (ISP). Which utility provides the most direct method to verify this connectivity?

<p>Ping &amp; NSLookup (A)</p> Signup and view all the answers

Which type of network topology involves each device being connected to a central cable, resulting in all data transmitting across this single line?

<p>Bus (D)</p> Signup and view all the answers

What is the primary goal of implementing Spanning Tree Protocol (STP) in a network environment?

<p>To prevent network loops (D)</p> Signup and view all the answers

What is the significance of a Network Baseline Document in network management?

<p>It records the initial performance statistics. (D)</p> Signup and view all the answers

A network administrator is designing a resilient network where all devices have direct connections to every other device. Which topology best describes this design?

<p>Mesh (B)</p> Signup and view all the answers

Which command is used to disable an interface on a router?

<p>Shutdown (D)</p> Signup and view all the answers

In the context of network security, what is the primary function of a firewall?

<p>To prevent unauthorized access (D)</p> Signup and view all the answers

What type of wireless network is characterized by decentralized architecture, lacking reliance on a pre-existing infrastructure like access points or managed routers?

<p>Ad Hoc Wireless Network (WANET) (A)</p> Signup and view all the answers

Which of the following protocols operates as an external routing protocol, commonly used by routers to exchange routing information across different autonomous systems?

<p>BGP (A)</p> Signup and view all the answers

Which of the following is a characteristic of stateless firewalls?

<p>Restricting or blocking packets based on static values such as source and destination addresses (C)</p> Signup and view all the answers

Which Layer 2 WAN protocol is most widely used for dedicated point-to-point connections?

<p>Point-to-Point Protocol (A)</p> Signup and view all the answers

What is the purpose of VLAN Trunking Protocol (VTP) in a switched network environment?

<p>Reducing administrative overhead by propagating VLAN information across switches (D)</p> Signup and view all the answers

What does the IPv6 link-local address FE80::/10 signify?

<p>An address that is only valid for communication within a single network segment (D)</p> Signup and view all the answers

Flashcards

What is ESD?

Potential harm to computer equipment from discharge.

What is a wrist strap?

Tool used for safety when repairing equipment.

How many bits in a Gigabit?

1,000,000,000 bits

What is a switch?

A device that operates at layer 1 or layer 2 of the OSI model, forwarding data between network segments based on MAC addresses.

Signup and view all the flashcards

What is the distance for a Cat 5 cable?

The maximum supported distance for a Category 5 cable is 100 meters.

Signup and view all the flashcards

What is Dispersion?

Signal degradation in fiber optic cables.

Signup and view all the flashcards

How is a switch different from a bridge?

A has higher port density, can handle more devices.

Signup and view all the flashcards

Network boundaries a bridge can support?

A bridge can support one network boundary.

Signup and view all the flashcards

What are well known ports?

These are system ports, reserved for common network services.

Signup and view all the flashcards

What does a switch do?

Segments network traffic using MAC addresses.

Signup and view all the flashcards

What does light on NIC mean?

Indicates a connection is present.

Signup and view all the flashcards

What is a Hub?

Extends network signal range.

Signup and view all the flashcards

What does a Router do?

Directs data between networks.

Signup and view all the flashcards

What is an Extended Star topology?

A network design arranged in a star fashion.

Signup and view all the flashcards

Why use Fiber?

Used for high-speed data transmission.

Signup and view all the flashcards

OSI model's 2nd lowest layer?

Data Link

Signup and view all the flashcards

How to disable a interface?

The command 'shutdown' disables a router interface.

Signup and view all the flashcards

3 OSI layers with multi-level devices?

Physical, DataLink, and Network

Signup and view all the flashcards

What is WLAN?

A standard for wireless networking.

Signup and view all the flashcards

What is an Ad Hoc Wireless Network?

A type of wireless network which is decentralized.

Signup and view all the flashcards

Study Notes

  • The biggest hazard for computers, laptops, or networking equipment is Electro Static Discharge (ESD).
  • A wrist strap is a safety tool for equipment repair.
  • A Gigabit is 1,000,000,000 bits.
  • A switch is a layer 1 or layer 2 device.
  • The maximum distance for a Cat 5 cable is 100 meters.
  • Dispersion refers to fiber cable loss of signal.
  • A switch has higher port density than a bridge.
  • A bridge can support 1 network boundary.
  • Ports 0-1023 are known as well-known ports.
  • A switch can segment a network.
  • The lights on a NIC card indicate connectivity.
  • A hub can act as a repeater.
  • A router is a common WAN device.
  • Extended Star is a type of network topology.
  • ISR stands for Integrated Service Routers.
  • Extended Star is a widely used network topology.
  • Fiber is best used for the backbone of a network.
  • A switch is a layer 2 device.
  • Data Link is the 2nd lowest layer in the OSI Model.
  • Bridges and switches operate in the lowest layer of the OSI Model.
  • Router interface E1 represents Ethernet.
  • Privileged mode is used to configure a router.
  • The shutdown command is used to disable an interface.
  • Physical, Datalink, and Network are the 3 layers in the OSI model where multi-level devices are found.
  • IEEE 802.11 is the WLAN standard.
  • Microwaves can cause interference in a wireless network.
  • An ad hoc wireless network (WANET) is decentralized and doesn't rely on pre-existing infrastructure.
  • In infrastructure mode, wireless units communicate through an access point serving as a bridge to other networks.
  • The Basic Service Set Identifier (BSSID) defines the most basic infrastructure mode network, a BSS of one WAP and one or more wireless nodes.
  • The Datalink layer in the OSI Model is where you find MAC addresses.
  • The Internet layer in the TCP/IP Model corresponds to the Network layer in the OSI Model.
  • DHCP assigns IP addresses, subnet masks, and gateway addresses to PCs.
  • TCP is a connection-oriented network service.
  • The port number for Telnet is 23.
  • BGP is an external protocol for a router.
  • OSPF is an internal protocol for a router.
  • VLANs can increase a broadcast domain.
  • VLAN Trunk Protocol (VTP) reduces administration in a switched network and propagates VLAN information, while Spanning Tree Protocol (STP) prevents loops.
  • There are 5 states associated with Spanning Tree Protocol.
  • Spanning Tree Protocol prevents loops and is a switch to switch protocol.
  • DSL stands for Digital Subscriber Line.
  • Host name is not needed to configure a client/server device.
  • UDP is a streaming video protocol used to increase speed.
  • An octet has 8 bits.
  • 16.15.4.8 255.0.0.0 represents a default class A Subnet mask.
  • IP Address and Subnet Mask are two essential settings needed to configure a PC on a LAN.
  • Require Authorization (Authentication) maintains integrity and security.
  • Limiting access to a secure network closet is a good security measure.
  • A firewall prevents traffic on a network.
  • A firewall's purpose is to prevent unauthorized access.
  • The port number for a Web server is 80.
  • ADSL stands for Asymmetric Digital Subscriber Line.
  • VoIP stands for Voice over IP.
  • Communications Patterns & Traffic/bandwidth should be validated in a network needs assessment.
  • There are 2 digits in binary.
  • There are 128 bits in an IPv6 address.
  • A MAC address has 48 characters; the first 24 bits are the manufacturer, and the second 24 bits are a unique number.
  • In IPv6, a single network address is called Unicast Link Local.
  • Anycast delivers messages to the nearest interface.
  • A network topology document records network infrastructure.
  • A Network Baseline Document records initial performance statistics.
  • A router creates a broadcast domain.
  • A switch creates a collision domain.
  • A switch increases network throughput.
  • Point-to-Point is the most widely used WAN Layer 2 Protocol.
  • Frame Relay is a WAN protocol used in the cloud.
  • The "Show Controller" command in a router shows the clock signal.
  • A router has the highest priority among network devices.
  • Bottom Up is the methodology used to troubleshoot a Layer 1 activity.
  • Offsite storage is part of a disaster recovery plan.
  • A technician should first check the network cable if a customer cannot access the Web.
  • An incorrect default gateway would cause a customer to be unable to print to a network printer.
  • Ping & NSLookup are utilities used to verify connectivity to an ISP.
  • Application gateway security applies to a specific application.
  • Stateless packet inspection inspects and filters IP addresses at the firewall.
  • Bus, Ring, Star, Extended Star, and Mesh are network topologies.
  • The bus topology connects devices to one cable.
  • Mesh and Full Mesh topologies connect all devices together.
  • Maintainability & Cable recognition are important advantages of good cable management practices.
  • Transparent, Server, and Client are the 3 VTP modes.
  • FE80: is an IPv6 LINK local Address.
  • VLAN Trunk Protocol (VTP) reduces administration in a switched network, and VLAN configuration on one VTP server distributes the VLAN across all switches in the domain.
  • Spanning Tree Protocol (STP) is a network protocol for loop-free Ethernet topologies, preventing bridge loops and broadcast radiation.
  • OSPF is a router protocol that finds the best path, while EIGRP is an advanced distance-vector routing protocol used on a computer network to automate routing decisions.
  • Stateless firewalls restrict packets based on static values; stateful firewalls watch traffic streams from end to end and can tell what stage a TCP connection is in.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Network Topologies
15 questions
Network Topologies
6 questions
Networking 2: Review of Basics
8 questions

Networking 2: Review of Basics

AdventuresomeJasper5389 avatar
AdventuresomeJasper5389
Network Devices and Topologies Quiz
18 questions

Network Devices and Topologies Quiz

PreeminentSnowflakeObsidian2360 avatar
PreeminentSnowflakeObsidian2360
Use Quizgecko on...
Browser
Browser