Podcast
Questions and Answers
What is an example of a Layer 3 device that connects multiple computers and networks?
What is an example of a Layer 3 device that connects multiple computers and networks?
- Packet
- Router (correct)
- Switch
- Repeater
If a router cannot determine the next hop for a packet, what action will the router take?
If a router cannot determine the next hop for a packet, what action will the router take?
- Send the packet back to the packet's source
- Broadcast the packet
- Store the packet in the memory buffer
- Forward the packet to the default route (correct)
You need to run four Ethernet network drops, each approximately 125 feet, in an area with potential interference. To minimize interference, which cable type should you use?
You need to run four Ethernet network drops, each approximately 125 feet, in an area with potential interference. To minimize interference, which cable type should you use?
- STP Cat5e (correct)
- Cat3
- UTP Cat5e
- UTP Cat6
What is one primary purpose of a perimeter network?
What is one primary purpose of a perimeter network?
Which protocol maps IP addresses to a Media Access Control (MAC) address?
Which protocol maps IP addresses to a Media Access Control (MAC) address?
You need to install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement?
You need to install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement?
You are setting up a computer network for a coffee shop that needs a public-facing web server, a Wi-Fi network for customers, a private network for point-of-sale terminals, an office PC, a file/print server, and a network printer. Which two items are best placed within the perimeter network?
You are setting up a computer network for a coffee shop that needs a public-facing web server, a Wi-Fi network for customers, a private network for point-of-sale terminals, an office PC, a file/print server, and a network printer. Which two items are best placed within the perimeter network?
What are three advantages of VLANs?
What are three advantages of VLANs?
Which of the following uses pointer records and A records?
Which of the following uses pointer records and A records?
Which of these addresses is a multicast address?
Which of these addresses is a multicast address?
What is the bit rate for a North American T3 circuit?
What is the bit rate for a North American T3 circuit?
Which of the following is a public IP address?
Which of the following is a public IP address?
Which metric does Routing Information Protocol (RIP) use to determine the least costly route?
Which metric does Routing Information Protocol (RIP) use to determine the least costly route?
What is a similarity between Layer 2 and Layer 3 switches?
What is a similarity between Layer 2 and Layer 3 switches?
What are two characteristics of fiber optic cable?
What are two characteristics of fiber optic cable?
VPNs are implemented to provide:
VPNs are implemented to provide:
What happens when an 802.11b node starts broadcasting within the range of an 802.11g access point?
What happens when an 802.11b node starts broadcasting within the range of an 802.11g access point?
According to the OSI model, encryption takes place on the transport layer. Select the correct answer if the underlined text does not make the statement correct.
According to the OSI model, encryption takes place on the transport layer. Select the correct answer if the underlined text does not make the statement correct.
Connecting to a private network address from a public network requires:
Connecting to a private network address from a public network requires:
What type of record does DNS use to find a mail service?
What type of record does DNS use to find a mail service?
In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
What are two differences between switches and hubs?
What are two differences between switches and hubs?
Every router today is TCP/IP enabled, which is an industry-standard protocol that you use on the Internet and for local addressing. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed' if the underlined text makes the statement correct.
Every router today is TCP/IP enabled, which is an industry-standard protocol that you use on the Internet and for local addressing. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed' if the underlined text makes the statement correct.
Which feature of Category 5e STP cable reduces external interference?
Which feature of Category 5e STP cable reduces external interference?
How many bits are there in an Internet Protocol version 6 (IPv6) address?
How many bits are there in an Internet Protocol version 6 (IPv6) address?
A Layer 2 device that connects multiple computers within a network is a:
A Layer 2 device that connects multiple computers within a network is a:
In addition to switching, multilayer switches also:
In addition to switching, multilayer switches also:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
In a wireless network that requires an SSL certificate, WEP handles the SSL certificate. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed' if the underlined text makes the statement correct.
In a wireless network that requires an SSL certificate, WEP handles the SSL certificate. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed' if the underlined text makes the statement correct.
Which of these cable types transmits data the greatest distance?
Which of these cable types transmits data the greatest distance?
What is the maximum cable length for a single Cat5 UTP cable run?
What is the maximum cable length for a single Cat5 UTP cable run?
The default gateway address identifies the:
The default gateway address identifies the:
Which of the following are features of DHCP? (Choose two.)
Which of the following are features of DHCP? (Choose two.)
Which command is used to verify that a server is connected to the network?
Which command is used to verify that a server is connected to the network?
The maximum throughput of an 802.11g network is:
The maximum throughput of an 802.11g network is:
In which physical network topology is each computer connected to a central point?
In which physical network topology is each computer connected to a central point?
WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed' if the underlined text makes the statement correct
WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed' if the underlined text makes the statement correct
When a client computer is unable to reach a DHCP server, it might automatically assign an IP address in the 10.0.0.0 -10.0.0.255 range. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed' if the underlined text makes the statement correct.
When a client computer is unable to reach a DHCP server, it might automatically assign an IP address in the 10.0.0.0 -10.0.0.255 range. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed' if the underlined text makes the statement correct.
The type of connector used on a 100BaseT Ethernet cable is:
The type of connector used on a 100BaseT Ethernet cable is:
At what layer in the OSI model are hardware addresses referenced?
At what layer in the OSI model are hardware addresses referenced?
What are two characteristics of a mesh network topology?
What are two characteristics of a mesh network topology?
To protect a network when it is connected to the Internet, you should use a:
To protect a network when it is connected to the Internet, you should use a:
Flashcards
What is a Router?
What is a Router?
A Layer 3 device that connects multiple computers and networks.
Router Action
Router Action
Forwards the packet to the default route when the next hop is unknown.
STP Cat5e
STP Cat5e
Shielded Twisted Pair Category 5e cable
Perimeter Network Purpose
Perimeter Network Purpose
Signup and view all the flashcards
Address Resolution Protocol
Address Resolution Protocol
Signup and view all the flashcards
Cat5e Cable
Cat5e Cable
Signup and view all the flashcards
Perimeter Network Items
Perimeter Network Items
Signup and view all the flashcards
Virtual LAN (VLAN) advantages
Virtual LAN (VLAN) advantages
Signup and view all the flashcards
Pointer and A records
Pointer and A records
Signup and view all the flashcards
Multicast IP Address
Multicast IP Address
Signup and view all the flashcards
North American T3 bit rate
North American T3 bit rate
Signup and view all the flashcards
Public IP Address
Public IP Address
Signup and view all the flashcards
Routing Information Protocol metric
Routing Information Protocol metric
Signup and view all the flashcards
Layer 2/3 switch similarity
Layer 2/3 switch similarity
Signup and view all the flashcards
Fiber Optic Cable Characteristics
Fiber Optic Cable Characteristics
Signup and view all the flashcards
VPN Implementation
VPN Implementation
Signup and view all the flashcards
Manually Select Connection
Manually Select Connection
Signup and view all the flashcards
Requires Certificates
Requires Certificates
Signup and view all the flashcards
What is ARP
What is ARP
Signup and view all the flashcards
802.11b/g Compatibility
802.11b/g Compatibility
Signup and view all the flashcards
Encryption Layer
Encryption Layer
Signup and view all the flashcards
Public to Private Network Connection
Public to Private Network Connection
Signup and view all the flashcards
DNS Mail Service Record
DNS Mail Service Record
Signup and view all the flashcards
Routing Information Metric
Routing Information Metric
Signup and view all the flashcards
Verify DHCP server
Verify DHCP server
Signup and view all the flashcards
Fiber Transmission
Fiber Transmission
Signup and view all the flashcards
Default Gateway Address
Default Gateway Address
Signup and view all the flashcards
Star Topology Advantages
Star Topology Advantages
Signup and view all the flashcards
Biggest Impact On Data Speed
Biggest Impact On Data Speed
Signup and view all the flashcards
Study Notes
- A router is a Layer 3 device that connects multiple computers and networks.
- A router forwards packets to the default route if the next hop cannot be determined.
- STP Cat5e cable should be used to reduce interference when running Ethernet network drops with existing interference.
- One purpose of a perimeter network is to make resources available to the Internet.
- Address Resolution Protocol (ARP) maps IP addresses to Media Access Control (MAC) addresses.
- Cat5e is the least expensive network cable option that supports at least 300 Mbps.
- A network printer and web server should be included in the perimeter network for a coffee shop setting.
- VLAN advantages:
- Compartmentalizes a network and isolates traffic.
- Single switch can implement more than one VLAN.
- Gives the impression of being on the same LAN regardless of the physical location.
- DNS Server uses pointer records and A records.
- 224.0.0.1 is a multicast address.
- A North American T3 circuit has a bit rate of 44.736 Mbit/s.
- 68.24.78.221 is a public IP address.
- Routing Information Protocol (RIP) uses Hop count to determine the least costly route.
- Layer 2 and Layer 3 switches both forward packets onto the network.
- Fiber optic cable characteristics:
- Supports splicing
- Requires a polish for end connectors
- VPNs provide a secure connection through public networks, and additional encryptions by using IPSec.
- When manually selecting the network to connect to, uncheck "Connect automatically when this network is in range."
- WPA-Enterprise requires certificates for its encryption.
IP Address and Protocol Mapping
- TCP protocols provide connection-oriented protocol with guaranteed service
- UDP protocols provide connectionless, message-based protocol with best-effort service
- ARP resolves IP addresses to MAC addresses
Networking Nodes
- When an 802.11b node begins broadcasting within range of an 802.11g access point, a connection will be established.
- Encryption takes place on the presentation layer, according to the OSI model.
- Connecting to a private network address from a public network requires Network Address Translation (NAT).
- DNS finds a mail service using a Mail Exchanger (MX) DNS record.
IP Address Range Matching
- Loopback addresses range from 127.0.0.0-127.255.255.255
- Multicast addresses range from 224.0.0.0-239.255.255.255
- Private network addresses range from 192.168.0.0-192.168.255.255
Switch Operations
- A switch sends unicast packets to one destination port only.
- A switch floods ports if it does not know where to send a packet.
Media Access Methods
- In LAN topologies, contention and token passing are the primary media access methods.
Switch vs Hub
- Switches are capable of sending and receiving data at the same time, unlike hubs.
- Switches can identify the intended destination of data, unlike hubs.
- Every router is not solely TCP/IP enabled and no change is needed.
- Category 5e STP cable reduces external interference through shielding.
- An Internet Protocol version 6 (IPv6) address has 128 bits.
Defining a Layer 2 Device
- A switch is a Layer 2 device that connects multiple computers within a network.
- Multilayer switches provide Layer 3 routing functions in addition to switching.
Quality of Service
- QOS allows defining traffic priority and controlling bandwidth.
Wireless Network Protocols
- 802.1X handles SSL certificates in a wireless network requiring one.
Troubleshooting Internet Access
- To allow Internet access, ensure a default gateway address is configured.
- To allow website lookups, configure DNS server settings.
- Single-mode fiber transmits data the greatest distance.
- VPN connections
- SSL VPN allows a remote user to connect to a private network from anywhere on the internet
- Site to Site VPN securely connects two portions of a private network or two private networks
- Layer 2 Tunneling Protocol creates an unencrypted connection between two network devices
- The maximum cable length for a single Cat5 UTP cable run is 328 feet/99.97 meters.
- The default gateway address identifies the device that will connect the computer to a remote network.
- Each hop in the trace route is a router.
- A trace route completed successfully indicates that was successful
- IPv4 Address Classes:
- Class C corresponds to 201.111.22.3,
- Class B corresponds to 133.234.23.2,
- Class D corresponds to 224.100.20.3
- Class A corresponds to 64.123.12.1
- HTTP, TELNET, FTP, and SMTP protocols operate on Layer 7 of the OSI model.
- Layer 3 of the OSI model controls routing between network devices.
- Some Important DHCP features are address reservation and IP address exclusion.
- A PING command verifies a server is connected to the network.
- The maximum throughput of an 802.11g network is 54 Mbps.
- In the star topology, each computer connects to a central point.
- WEP wireless encryption is the most susceptible to interception and decryption, no change is needed.
- When a client computer can't reach a DHCP server, it automatically assigns an IP address in the 169.254.0.0-169.254.255.255 range.
- RJ-45 connector is used on a 100BaseT Ethernet cable.
- Hardware addresses are referenced in the Data link layer in the OSI model.
- Characteristics of a mesh network topology:
- Fault tolerant because of redundant connections.
- Every node connects to every other node on the network.
- To protect a network when it's connected to the Internet, you should use a Firewall.
- TTL indicates the length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it.
- The loopback address of your computer is 127.0.0.1, no change is needed.
- To restore access to network resources with a 169.254.48.97 IP address, verify that the DHCP service is available.
- The correct term is Zone transfer.
- A tracert command displays router addresses that are traversed between a source and a destination.
- HTTPS encrypts packets on the Internet.
- If a computer with an IP address of 169.254.0.1 cannot access the network confirm DHCP is available.
- Domain Name Service (DNS) is the service that resolves fully qualified domain names (FQDN) to IP addresses.
- Internet Key Exchange (IKE) is responsible for negotiating algorithms to use and exchanging key information.
- The node transmits, but the access point is unable to receive when an 802.11a node broadcasts within range of an 802.11g access point.
- Connectivity options for wide area networks (WANs) listed includes Dial-up and Leased line.
Key TCP ports
- SMTP's port is 25.
- FTP's port is 21.
- HTTP's port is 80.
- HTTPS's port is 443
Characteristics of 802.11a
- Frequency range: 5.1-5.8 Ghz
- Data rate: 54 Mbps
Characteristics of 802.11b
- Frequency range: 2.4-2.485 Ghz
- Data rate: 11 Mbps
Characteristics of 802.11g
- Frequency range: 2.4-2.485 Ghz or 5.1-5.8 Ghz
- Data rate: 54 Mbps
Characteristics of 802.11n
- Frequency range: 2.4-2.485 Ghz or 5.1-5.8 Ghz
- Data rate: 65-600 Mbps
- Trunk ports support VLAN traffic between two switches.
- The command-line tool netstat lists a host's active incoming connections.
- A network administrator sets a router's static route.
- ::1 represents the Internet Protocol version 6 (IPv6) loopback address.
- 802.11g and 802.11n are published IEEE 802.11 wireless transmission standards.
- One reason to replace an unmanaged switch with a managed switch is to support multiple VLANS.
- Windows Internet Name Service (WINS) is a service that resolves NetBIOS names to IP addresses.
- Mesh topology uses redundant paths
- In Local area networks, required:
- NIC(Network Interface Card)
- IP address
OSI Model Layers
-
HTTP, TELNET, FTP, and SMTP protocols operate on Layer 7
-
Layer 4 of the OSI model controls dialogue between computers.
-
Layer 3 of the OSI model controls routing between network devices.
-
Point-to-Point Protocol (PPP) is a Layer 2 WAN protocol.
-
A user is unlikely to receive a response as DNS is not resolving.
-
Wireless networks are vulnerable to intrusion through the radio broadcast access method.
-
Action Center ports to allow accessing websites are Port 80 and port 443.
-
A Host (A) DNS record maps host names to addresses.
-
FTP is an application layer protocol.
-
netstat command displays the ports that your computer is listening for.
-
A Managed switch interconnects computers in a workgroup, and is able to be remotely configured, and provides the best throughout.
-
The TCP/IP and OSI models have 4 and 7 layers respectively.
-
Topology and protocols determine media access method.
-
All session data is isn't encrypted between all machines while using telnet.
-
IPv4 multicast addresses range from 224.0.0.0 to 239.255.255.255 and so there is no change needed.
-
Key Characteristics of CSMA/CD media access method
-
It checks to see if a collision has been detected.
-
It signals its intent to transmit on the network.
-
NSLOOKUP
-
Regarding IP configuration, the CIDR notation 192.168.1.1/25 refers to the configuration of 192.168.1.1 255.255.255.128.
-
A primary zone is the first DNS zone to which all updates for the records that belong to that zone are written.
-
The most secure wireless authentication method is WI-FI Protected Access (WPA)
-
Trusted Sites
-
Valid Subnet Mask
-
255.255.255.240
-
telnet
-
-
Where does routing occur
-
Network
-
DHCP not functioning
-
169.254.1.15
-
Two companies are sharing data
-
Extranet
-
In a corporate LAN without user action to connect
-
DirectAccess
-
Display of Client Address
-
ipconfig
-
Problems connecting to the internet, possible electromagnetic interference
-
D. Electromagnetic interference (EMI)
-
alias name of another address record in DNS is
-
CNAME
-
Tracert Packet Tracing
-
C. Report the route taken by packets across an IP network.
-
for automatically assigning IP addresses.
-
DHCP Determine media and speed
-
D. Topology and protocols
-
-Telnet Encrpytion Type
- A. Not encrypted
-
ipv4 address for multicast C. 224.0.0.0 to 239.255.255.255
-
Collision detection CSMA with CD A. It checks to see if a collision has been detected. C. It signals its intent to transmit on the network.
-
Name Settings Domain
-
B. NSLOOKUP
-
192.168.1 notation
-
E. 192.168.1.1 255.255.255.128
-
Domain configuration
-
A. Primary zone
-
highest wireless security? -C. WI-FI Protected Access (WPA) Lowest secure site -B. Trusted Sites Valid bitmask? A. 255.255.255.240
-
telnet
- A. 23
-
OSI Router
- B. Network no DHCP
- A. 169.254.1.15 shred Data -extranet LAN - No action, Corporate
-
direct access
-
VPN- not secured
-
ping results
-
did not return unknown
-
TCP/IP has how many layers
- 4
-
Ethernet network standard cable
- B. Category 5 UTP cable Direct Ethernet network cable, use
- A. Crossover cable.
-
Match OSI Layers
-
Correct answers indicated by bold
OSI Model -Answer Area Data Link
- It ensures that reassembled bits are in the correct order, and it requests retransmission of frames if an error occurs. Switches and WAPs operate on this layer. Network
- It is responsible for path determination and delivery of packets, but does not guarantee delivery. ICMP, RIP, and ARP operate on this layer.*" Session +It controls dialogue between source and destination nodes. RPC and NETBIOS operate on this layer. Application
- It provides network services directly to the user's application. TELNET, SMTP, and NTP operate on this layer.*"
WAN T3
-A. Network Policy and Access Services
- B. Routing and Remote Access Service Max cable
- 100m
- no DHPC- DHCP, the clients will not be able to obtain their leases from the server.
- Is IPV4 consists of 64
-
- B. FALSE 8 bits names
- TRUE
- not 256 - FALSE
- transfer protocol
- UDP
Help Set up web to get more security A. Set the web server in a perimeter network. You can set up computer to communicate secure what for Windows R B. Routing and Remote Access Services Max base range is D. 100
- if Router does not work with DHPC leases . B. Be unable to obtain their leases from the server. 64 bits FALSE
• Determine the network portion of a host address. • Self-test a host's own network interface. •SO
- A. Server to network in the main campus server room • B. It has low bandwidth Network A • A. Extranet •B. Network A A. has its security concerns because of the radio broadcast access method. • A -1.0. A network that is will have access to internet due to the local network. • The Router
- It Provides low bandwidth The IPv6 address with the has how bit 128 The TCP/IP is
- A. IPv6
#Network • A12
- E. 192.168.1.1" 255.255.255.128 and has beed is is the network's access. • D. IPv6 and has • A Network A to a computer is with Internet Protocol service DHCP. • The B the is . A Network and has A.
A. A is with A1 the . • 2100024 It signal the or A. with D.15, IP-4 is service. 1 as as1 A is A DHCP for B - . is and A B B . DTP The B and
• C. to for is is A A B . • B2 C is is A It the service of with D •A1 Network1 The ANetworkA The -9/1 B is . B the It to and A1It with to is- DHCP2 D -4A6" • The B is A A and D A has a service" . with" This type to is
- C A D
- B
- B
- C is
#Network to it and of to an access of1to service and" is of withB to
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.