Podcast
Questions and Answers
Which layer in the TCP model has TCP as its main protocol?
Which layer in the TCP model has TCP as its main protocol?
What is the first step in troubleshooting a network-related problem in a small to medium-sized business?
What is the first step in troubleshooting a network-related problem in a small to medium-sized business?
Identify the problem
Ping is used to see if one can connect to a destination's IP address.
Ping is used to see if one can connect to a destination's IP address.
True
Traceroute shows actual IP addresses on a path from a source to a destination.
Traceroute shows actual IP addresses on a path from a source to a destination.
Signup and view all the answers
The host command performs DNS lookups.
The host command performs DNS lookups.
Signup and view all the answers
Netstat shows open and listening ports on a device.
Netstat shows open and listening ports on a device.
Signup and view all the answers
Which type of network cables can carry signals over the longest distances?
Which type of network cables can carry signals over the longest distances?
Signup and view all the answers
A layer 2 switch is also called a bridge.
A layer 2 switch is also called a bridge.
Signup and view all the answers
A layer 2 switch uses routing tables.
A layer 2 switch uses routing tables.
Signup and view all the answers
A switch floods ports if it does not know where to send a packet.
A switch floods ports if it does not know where to send a packet.
Signup and view all the answers
A Firewall can be a hardware device.
A Firewall can be a hardware device.
Signup and view all the answers
A Firewall can be a software package.
A Firewall can be a software package.
Signup and view all the answers
A Firewall is a special room to protect servers.
A Firewall is a special room to protect servers.
Signup and view all the answers
A secondary name server gets its data from another name server using a zone transfer.
A secondary name server gets its data from another name server using a zone transfer.
Signup and view all the answers
AAAA records resolve hostnames to IPv4 addresses.
AAAA records resolve hostnames to IPv4 addresses.
Signup and view all the answers
Entries in a HOSTS file on a local computer take precedence over DNS.
Entries in a HOSTS file on a local computer take precedence over DNS.
Signup and view all the answers
A user in your company cannot connect to any of the servers which are on the 192.168.1.0 network. The problem is?
A user in your company cannot connect to any of the servers which are on the 192.168.1.0 network. The problem is?
Signup and view all the answers
What is the solution for a user unable to connect to servers on the 192.168.1.0 network?
What is the solution for a user unable to connect to servers on the 192.168.1.0 network?
Signup and view all the answers
Which are tunnels used to transmit IPv6 address information over IPv4? (Choose two)
Which are tunnels used to transmit IPv6 address information over IPv4? (Choose two)
Signup and view all the answers
What should you do to group all of the Administrative Assistants' computers to communicate as if they were on the same network?
What should you do to group all of the Administrative Assistants' computers to communicate as if they were on the same network?
Signup and view all the answers
Which command-line tool is used to display IP address information and DHCP server information?
Which command-line tool is used to display IP address information and DHCP server information?
Signup and view all the answers
How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users?
How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users?
Signup and view all the answers
Which one of the following is a second-level domain?
Which one of the following is a second-level domain?
Signup and view all the answers
What is the main method used by firewalls to filter traffic? (Choose two)
What is the main method used by firewalls to filter traffic? (Choose two)
Signup and view all the answers
A router is a device that functions primarily on the Data Link layer of the OSI Model.
A router is a device that functions primarily on the Data Link layer of the OSI Model.
Signup and view all the answers
What type of connection allows for sending and receiving data simultaneously?
What type of connection allows for sending and receiving data simultaneously?
Signup and view all the answers
What type of VPN should you set up between two companies collaborating on a project?
What type of VPN should you set up between two companies collaborating on a project?
Signup and view all the answers
Match the following networking functions with their definitions:
Match the following networking functions with their definitions:
Signup and view all the answers
Match the following connection types with their descriptions:
Match the following connection types with their descriptions:
Signup and view all the answers
A router is used to separate multiple networks.
A router is used to separate multiple networks.
Signup and view all the answers
A VLAN is typically configured on a router.
A VLAN is typically configured on a router.
Signup and view all the answers
NAT is the mapping of a private LAN IP address to a public IP address.
NAT is the mapping of a private LAN IP address to a public IP address.
Signup and view all the answers
Public websites are accessed through port 25.
Public websites are accessed through port 25.
Signup and view all the answers
Secured websites are accessed through port 443 by default.
Secured websites are accessed through port 443 by default.
Signup and view all the answers
Unsecured websites are accessed through port 80 by default.
Unsecured websites are accessed through port 80 by default.
Signup and view all the answers
An example of a physical ring topology would be what?
An example of a physical ring topology would be what?
Signup and view all the answers
The cable in the box is a _____ cable.
The cable in the box is a _____ cable.
Signup and view all the answers
In which type of connection would a crossover cable be used?
In which type of connection would a crossover cable be used?
Signup and view all the answers
What is indicated by the portion of the diagram labeled 'A'?
What is indicated by the portion of the diagram labeled 'A'?
Signup and view all the answers
What is indicated by the portion of the diagram labeled 'B'?
What is indicated by the portion of the diagram labeled 'B'?
Signup and view all the answers
What is indicated by the portion of the diagram labeled 'C'?
What is indicated by the portion of the diagram labeled 'C'?
Signup and view all the answers
A mesh network has to have termination points at both ends of the network.
A mesh network has to have termination points at both ends of the network.
Signup and view all the answers
What is the physical topology of the mentioned network?
What is the physical topology of the mentioned network?
Signup and view all the answers
How many connections are there among the routers?
How many connections are there among the routers?
Signup and view all the answers
Which two types of servers are typically placed in a perimeter network?
Which two types of servers are typically placed in a perimeter network?
Signup and view all the answers
What must be changed to receive an IP address from the DHCP service on the router?
What must be changed to receive an IP address from the DHCP service on the router?
Signup and view all the answers
How should the DNS address be obtained after setting DHCP?
How should the DNS address be obtained after setting DHCP?
Signup and view all the answers
Match the following ping commands with their descriptions:
Match the following ping commands with their descriptions:
Signup and view all the answers
Match the following cable types with their speed capacities:
Match the following cable types with their speed capacities:
Signup and view all the answers
Which two options are valid IP addresses you could assign to a computer on the same network as a router configured with an interface of 192.168.1.100?
Which two options are valid IP addresses you could assign to a computer on the same network as a router configured with an interface of 192.168.1.100?
Signup and view all the answers
What does 'WAN' refer to in networking?
What does 'WAN' refer to in networking?
Signup and view all the answers
In which directions can communication occur between layers of the OSI model? (Choose three)
In which directions can communication occur between layers of the OSI model? (Choose three)
Signup and view all the answers
Which three layers on the OSI model make up the Application layer on the TCP model? (Choose three)
Which three layers on the OSI model make up the Application layer on the TCP model? (Choose three)
Signup and view all the answers
What is the physical topology of this network?
What is the physical topology of this network?
Signup and view all the answers
What is indicated by the ranges 192.168.0.0 - 192.168.255.255?
What is indicated by the ranges 192.168.0.0 - 192.168.255.255?
Signup and view all the answers
What is indicated by the ranges 224.0.0.0 - 239.255.255.255?
What is indicated by the ranges 224.0.0.0 - 239.255.255.255?
Signup and view all the answers
What is indicated by the ranges 75.0.0.0 - 75.255.255.255?
What is indicated by the ranges 75.0.0.0 - 75.255.255.255?
Signup and view all the answers
You should use a _____ cable to connect each computer to the hub.
You should use a _____ cable to connect each computer to the hub.
Signup and view all the answers
You should use a _____ cable to connect each hub to the switch.
You should use a _____ cable to connect each hub to the switch.
Signup and view all the answers
What is the primary disadvantage of a bus topology?
What is the primary disadvantage of a bus topology?
Signup and view all the answers
Which IP address in a routing table signifies a default route?
Which IP address in a routing table signifies a default route?
Signup and view all the answers
Which is a characteristic of peer to peer networks?
Which is a characteristic of peer to peer networks?
Signup and view all the answers
What best describes a virtual machine?
What best describes a virtual machine?
Signup and view all the answers
Which tool should you use to test if your Ethernet cables are wired correctly?
Which tool should you use to test if your Ethernet cables are wired correctly?
Signup and view all the answers
Which type of wireless network does not have a centralized device, such as a wireless access point or wireless router?
Which type of wireless network does not have a centralized device, such as a wireless access point or wireless router?
Signup and view all the answers
Which role needs to be added to an on-premises Windows Server in order to enable routing through the server?
Which role needs to be added to an on-premises Windows Server in order to enable routing through the server?
Signup and view all the answers
What is the local address in IPv6?
What is the local address in IPv6?
Signup and view all the answers
Study Notes
Transport Layer
- TCP is the main protocol in the Transport layer of the TCP model.
Troubleshooting Steps
- The initial step in diagnosing network problems in small to medium-sized businesses is identifying the issue.
Network Commands
- Ping tests connectivity to a destination IP address.
- Traceroute displays IP addresses along the path from source to destination.
- The host command performs DNS lookups.
- Netstat reveals open and listening ports on a device.
Network Cabling
- Single-mode fiber cables can carry signals over the longest distances.
Layer 2 Switches
- A layer 2 switch is also known as a bridge.
- Layer 2 switches do not use routing tables and flood ports when the destination is unknown.
Firewalls
- Firewalls can be either hardware devices or software packages, but they are not physical rooms for server protection.
DNS and HOSTS File
- A secondary name server obtains data from another server via zone transfer.
- AAAA records resolve hostnames to IPv6 addresses.
- Entries in a HOSTS file take precedence over DNS entries.
Network Connectivity Issue
- A common issue for users unable to connect to a specific network is the absence of a default gateway; configuring a default gateway in the appropriate network can resolve this.
IPv6 Tunneling
- ISATAP and Teredo are tunneling protocols for transmitting IPv6 information over IPv4.
VLAN Configuration
- To enable communication among a group of computers located in different areas, configure a Virtual Local Area Network (VLAN).
IP Addressing Tools
- The command
ipconfig /all
displays detailed IP and DHCP server information.
Secure Communications
- Virtual Private Networks (VPNs) are used to secure messages over public networks from unauthorized access.
Domain Names
- An example of a second-level domain is "in-addr.arpa".
Traffic Filtering by Firewalls
- Firewalls primarily filter traffic based on ports and protocols.
Router Functionality
- Routers operate primarily at the Network layer, not the Data Link layer.
Connection Types
- Full duplex connections allow simultaneous sending and receiving of data.
VPN Types
- Site-to-site VPNs are used to connect two networks for collaboration.
Network Component Functions
- Firewalls control data packet access, Remote Access Servers authenticate users, DHCP distributes IP addresses, NAT manages private IP routing, and VPNs facilitate secure communications over public networks.
Internet Connection Types
- Cable modems use shared broadband, DSL uses dedicated lines, and ISDN employs two 64Kbps channels.
Router and NAT Functions
- A router separates multiple networks; NAT translates private IP addresses to public ones; VLAN configurations typically occur on switches, not routers.
Common Ports
- Port 25 is used for email, while ports 80 and 443 are used for unsecured and secured web traffic respectively.
Topology Considerations
- Ring topology is often mistaken for star topology; the physical topology of a network can significantly affect performance and reliability.
Networking Standards
- A crossover cable is used to connect similar devices, like switch to switch, while straight-through cables connect dissimilar devices, like computers to switches.
Network Address Ranges
- Private network addresses range from 192.168.0.0 to 192.168.255.255, multicast addresses from 224.0.0.0 to 239.255.255.255, and public network addresses cover the remainder.
Bus Topology Disadvantage
- A major drawback of bus topology is its reliance on a single cable, representing a single point of failure.
Default Routing
- The default route in a routing table is indicated by the address 0.0.0.0.
Peer-to-Peer Networks
- Peer-to-peer networks typically connect 10 or fewer devices, allowing direct communication between users.
Virtual Machines
- Virtual machines enable multiple operating systems to run on a single physical computer, enhancing resource utilization.
Cable Testing
- A cable tester is essential for verifying the correct wiring of Ethernet cables.
Wireless Networking
- Ad hoc networks operate without centralized devices like routers or access points.
Routing on Windows Servers
- To enable routing on an on-premises Windows Server, the Remote Access role must be added.
IPv6 Local Address
- The local IPv6 address (::1) is the loopback address, analogous to 127.0.0.1 in IPv4.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on core networking concepts, including the Transport layer, common network commands, and cabling types. This quiz covers everything from TCP to firewalls, ensuring you have a comprehensive understanding of network fundamentals.