Podcast
Questions and Answers
Which scenario poses the greatest risk to computers, laptops, and networking equipment?
Which scenario poses the greatest risk to computers, laptops, and networking equipment?
- Dust accumulation
- Electrostatic discharge (correct)
- High humidity levels
- Fluctuations in ambient temperature
Which of the following is the primary differentiating factor between a network switch and a network bridge?
Which of the following is the primary differentiating factor between a network switch and a network bridge?
- A switch can support multiple network boundaries, while a bridge typically supports only one
- A switch uses a routing table to forward traffic, while a bridge uses a forwarding table
- A switch operates at Layer 3 while a bridge operates at Layer 2
- A switch has higher port density compared to a bridge (correct)
If a network technician is unable to access a website, what is the first physical element they should verify?
If a network technician is unable to access a website, what is the first physical element they should verify?
- Connectivity to the DNS server
- The configuration of the default gateway
- The network cable connecting their device (correct)
- The status of the DHCP server
What critical settings are essential for configuring a PC to operate on a Local Area Network (LAN)?
What critical settings are essential for configuring a PC to operate on a Local Area Network (LAN)?
Which OSI model layer incorporates the Physical, Data Link, and Network layers when mapping to the TCP/IP model?
Which OSI model layer incorporates the Physical, Data Link, and Network layers when mapping to the TCP/IP model?
A network administrator wants to implement a protocol that dynamically assigns IP addresses, subnet masks, and gateway addresses to client computers. Which protocol fulfills this requirement?
A network administrator wants to implement a protocol that dynamically assigns IP addresses, subnet masks, and gateway addresses to client computers. Which protocol fulfills this requirement?
A network administrator is troubleshooting connectivity issues for a customer who cannot print to a shared network printer. Which of the following configurations is most likely to be misconfigured?
A network administrator is troubleshooting connectivity issues for a customer who cannot print to a shared network printer. Which of the following configurations is most likely to be misconfigured?
A network technician suspects a connectivity issue between a local network and an Internet Service Provider (ISP). Which utility provides the most direct method to verify this connectivity?
A network technician suspects a connectivity issue between a local network and an Internet Service Provider (ISP). Which utility provides the most direct method to verify this connectivity?
Which type of network topology involves each device being connected to a central cable, resulting in all data transmitting across this single line?
Which type of network topology involves each device being connected to a central cable, resulting in all data transmitting across this single line?
What is the primary goal of implementing Spanning Tree Protocol (STP) in a network environment?
What is the primary goal of implementing Spanning Tree Protocol (STP) in a network environment?
What is the significance of a Network Baseline Document in network management?
What is the significance of a Network Baseline Document in network management?
A network administrator is designing a resilient network where all devices have direct connections to every other device. Which topology best describes this design?
A network administrator is designing a resilient network where all devices have direct connections to every other device. Which topology best describes this design?
Which command is used to disable an interface on a router?
Which command is used to disable an interface on a router?
In the context of network security, what is the primary function of a firewall?
In the context of network security, what is the primary function of a firewall?
What type of wireless network is characterized by decentralized architecture, lacking reliance on a pre-existing infrastructure like access points or managed routers?
What type of wireless network is characterized by decentralized architecture, lacking reliance on a pre-existing infrastructure like access points or managed routers?
Which of the following protocols operates as an external routing protocol, commonly used by routers to exchange routing information across different autonomous systems?
Which of the following protocols operates as an external routing protocol, commonly used by routers to exchange routing information across different autonomous systems?
Which of the following is a characteristic of stateless firewalls?
Which of the following is a characteristic of stateless firewalls?
Which Layer 2 WAN protocol is most widely used for dedicated point-to-point connections?
Which Layer 2 WAN protocol is most widely used for dedicated point-to-point connections?
What is the purpose of VLAN Trunking Protocol (VTP) in a switched network environment?
What is the purpose of VLAN Trunking Protocol (VTP) in a switched network environment?
What does the IPv6 link-local address FE80::/10
signify?
What does the IPv6 link-local address FE80::/10
signify?
Flashcards
What is ESD?
What is ESD?
Potential harm to computer equipment from discharge.
What is a wrist strap?
What is a wrist strap?
Tool used for safety when repairing equipment.
How many bits in a Gigabit?
How many bits in a Gigabit?
1,000,000,000 bits
What is a switch?
What is a switch?
Signup and view all the flashcards
What is the distance for a Cat 5 cable?
What is the distance for a Cat 5 cable?
Signup and view all the flashcards
What is Dispersion?
What is Dispersion?
Signup and view all the flashcards
How is a switch different from a bridge?
How is a switch different from a bridge?
Signup and view all the flashcards
Network boundaries a bridge can support?
Network boundaries a bridge can support?
Signup and view all the flashcards
What are well known ports?
What are well known ports?
Signup and view all the flashcards
What does a switch do?
What does a switch do?
Signup and view all the flashcards
What does light on NIC mean?
What does light on NIC mean?
Signup and view all the flashcards
What is a Hub?
What is a Hub?
Signup and view all the flashcards
What does a Router do?
What does a Router do?
Signup and view all the flashcards
What is an Extended Star topology?
What is an Extended Star topology?
Signup and view all the flashcards
Why use Fiber?
Why use Fiber?
Signup and view all the flashcards
OSI model's 2nd lowest layer?
OSI model's 2nd lowest layer?
Signup and view all the flashcards
How to disable a interface?
How to disable a interface?
Signup and view all the flashcards
3 OSI layers with multi-level devices?
3 OSI layers with multi-level devices?
Signup and view all the flashcards
What is WLAN?
What is WLAN?
Signup and view all the flashcards
What is an Ad Hoc Wireless Network?
What is an Ad Hoc Wireless Network?
Signup and view all the flashcards
Study Notes
- The biggest hazard for computers, laptops, or networking equipment is Electro Static Discharge (ESD).
- A wrist strap is a safety tool for equipment repair.
- A Gigabit is 1,000,000,000 bits.
- A switch is a layer 1 or layer 2 device.
- The maximum distance for a Cat 5 cable is 100 meters.
- Dispersion refers to fiber cable loss of signal.
- A switch has higher port density than a bridge.
- A bridge can support 1 network boundary.
- Ports 0-1023 are known as well-known ports.
- A switch can segment a network.
- The lights on a NIC card indicate connectivity.
- A hub can act as a repeater.
- A router is a common WAN device.
- Extended Star is a type of network topology.
- ISR stands for Integrated Service Routers.
- Extended Star is a widely used network topology.
- Fiber is best used for the backbone of a network.
- A switch is a layer 2 device.
- Data Link is the 2nd lowest layer in the OSI Model.
- Bridges and switches operate in the lowest layer of the OSI Model.
- Router interface E1 represents Ethernet.
- Privileged mode is used to configure a router.
- The shutdown command is used to disable an interface.
- Physical, Datalink, and Network are the 3 layers in the OSI model where multi-level devices are found.
- IEEE 802.11 is the WLAN standard.
- Microwaves can cause interference in a wireless network.
- An ad hoc wireless network (WANET) is decentralized and doesn't rely on pre-existing infrastructure.
- In infrastructure mode, wireless units communicate through an access point serving as a bridge to other networks.
- The Basic Service Set Identifier (BSSID) defines the most basic infrastructure mode network, a BSS of one WAP and one or more wireless nodes.
- The Datalink layer in the OSI Model is where you find MAC addresses.
- The Internet layer in the TCP/IP Model corresponds to the Network layer in the OSI Model.
- DHCP assigns IP addresses, subnet masks, and gateway addresses to PCs.
- TCP is a connection-oriented network service.
- The port number for Telnet is 23.
- BGP is an external protocol for a router.
- OSPF is an internal protocol for a router.
- VLANs can increase a broadcast domain.
- VLAN Trunk Protocol (VTP) reduces administration in a switched network and propagates VLAN information, while Spanning Tree Protocol (STP) prevents loops.
- There are 5 states associated with Spanning Tree Protocol.
- Spanning Tree Protocol prevents loops and is a switch to switch protocol.
- DSL stands for Digital Subscriber Line.
- Host name is not needed to configure a client/server device.
- UDP is a streaming video protocol used to increase speed.
- An octet has 8 bits.
- 16.15.4.8 255.0.0.0 represents a default class A Subnet mask.
- IP Address and Subnet Mask are two essential settings needed to configure a PC on a LAN.
- Require Authorization (Authentication) maintains integrity and security.
- Limiting access to a secure network closet is a good security measure.
- A firewall prevents traffic on a network.
- A firewall's purpose is to prevent unauthorized access.
- The port number for a Web server is 80.
- ADSL stands for Asymmetric Digital Subscriber Line.
- VoIP stands for Voice over IP.
- Communications Patterns & Traffic/bandwidth should be validated in a network needs assessment.
- There are 2 digits in binary.
- There are 128 bits in an IPv6 address.
- A MAC address has 48 characters; the first 24 bits are the manufacturer, and the second 24 bits are a unique number.
- In IPv6, a single network address is called Unicast Link Local.
- Anycast delivers messages to the nearest interface.
- A network topology document records network infrastructure.
- A Network Baseline Document records initial performance statistics.
- A router creates a broadcast domain.
- A switch creates a collision domain.
- A switch increases network throughput.
- Point-to-Point is the most widely used WAN Layer 2 Protocol.
- Frame Relay is a WAN protocol used in the cloud.
- The "Show Controller" command in a router shows the clock signal.
- A router has the highest priority among network devices.
- Bottom Up is the methodology used to troubleshoot a Layer 1 activity.
- Offsite storage is part of a disaster recovery plan.
- A technician should first check the network cable if a customer cannot access the Web.
- An incorrect default gateway would cause a customer to be unable to print to a network printer.
- Ping & NSLookup are utilities used to verify connectivity to an ISP.
- Application gateway security applies to a specific application.
- Stateless packet inspection inspects and filters IP addresses at the firewall.
- Bus, Ring, Star, Extended Star, and Mesh are network topologies.
- The bus topology connects devices to one cable.
- Mesh and Full Mesh topologies connect all devices together.
- Maintainability & Cable recognition are important advantages of good cable management practices.
- Transparent, Server, and Client are the 3 VTP modes.
- FE80: is an IPv6 LINK local Address.
- VLAN Trunk Protocol (VTP) reduces administration in a switched network, and VLAN configuration on one VTP server distributes the VLAN across all switches in the domain.
- Spanning Tree Protocol (STP) is a network protocol for loop-free Ethernet topologies, preventing bridge loops and broadcast radiation.
- OSPF is a router protocol that finds the best path, while EIGRP is an advanced distance-vector routing protocol used on a computer network to automate routing decisions.
- Stateless firewalls restrict packets based on static values; stateful firewalls watch traffic streams from end to end and can tell what stage a TCP connection is in.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.