Podcast
Questions and Answers
Which layer in the TCP model has TCP as its main protocol?
Which layer in the TCP model has TCP as its main protocol?
- Network
- Application
- Transport (correct)
- Data Link
What is the first step in troubleshooting a network-related problem in a small to medium-sized business?
What is the first step in troubleshooting a network-related problem in a small to medium-sized business?
Identify the problem
Ping is used to see if one can connect to a destination's IP address.
Ping is used to see if one can connect to a destination's IP address.
True (A)
Traceroute shows actual IP addresses on a path from a source to a destination.
Traceroute shows actual IP addresses on a path from a source to a destination.
The host command performs DNS lookups.
The host command performs DNS lookups.
Netstat shows open and listening ports on a device.
Netstat shows open and listening ports on a device.
Which type of network cables can carry signals over the longest distances?
Which type of network cables can carry signals over the longest distances?
A layer 2 switch is also called a bridge.
A layer 2 switch is also called a bridge.
A layer 2 switch uses routing tables.
A layer 2 switch uses routing tables.
A switch floods ports if it does not know where to send a packet.
A switch floods ports if it does not know where to send a packet.
A Firewall can be a hardware device.
A Firewall can be a hardware device.
A Firewall can be a software package.
A Firewall can be a software package.
A Firewall is a special room to protect servers.
A Firewall is a special room to protect servers.
A secondary name server gets its data from another name server using a zone transfer.
A secondary name server gets its data from another name server using a zone transfer.
AAAA records resolve hostnames to IPv4 addresses.
AAAA records resolve hostnames to IPv4 addresses.
Entries in a HOSTS file on a local computer take precedence over DNS.
Entries in a HOSTS file on a local computer take precedence over DNS.
A user in your company cannot connect to any of the servers which are on the 192.168.1.0 network. The problem is?
A user in your company cannot connect to any of the servers which are on the 192.168.1.0 network. The problem is?
What is the solution for a user unable to connect to servers on the 192.168.1.0 network?
What is the solution for a user unable to connect to servers on the 192.168.1.0 network?
Which are tunnels used to transmit IPv6 address information over IPv4? (Choose two)
Which are tunnels used to transmit IPv6 address information over IPv4? (Choose two)
What should you do to group all of the Administrative Assistants' computers to communicate as if they were on the same network?
What should you do to group all of the Administrative Assistants' computers to communicate as if they were on the same network?
Which command-line tool is used to display IP address information and DHCP server information?
Which command-line tool is used to display IP address information and DHCP server information?
How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users?
How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users?
Which one of the following is a second-level domain?
Which one of the following is a second-level domain?
What is the main method used by firewalls to filter traffic? (Choose two)
What is the main method used by firewalls to filter traffic? (Choose two)
A router is a device that functions primarily on the Data Link layer of the OSI Model.
A router is a device that functions primarily on the Data Link layer of the OSI Model.
What type of connection allows for sending and receiving data simultaneously?
What type of connection allows for sending and receiving data simultaneously?
What type of VPN should you set up between two companies collaborating on a project?
What type of VPN should you set up between two companies collaborating on a project?
Match the following networking functions with their definitions:
Match the following networking functions with their definitions:
Match the following connection types with their descriptions:
Match the following connection types with their descriptions:
A router is used to separate multiple networks.
A router is used to separate multiple networks.
A VLAN is typically configured on a router.
A VLAN is typically configured on a router.
NAT is the mapping of a private LAN IP address to a public IP address.
NAT is the mapping of a private LAN IP address to a public IP address.
Public websites are accessed through port 25.
Public websites are accessed through port 25.
Secured websites are accessed through port 443 by default.
Secured websites are accessed through port 443 by default.
Unsecured websites are accessed through port 80 by default.
Unsecured websites are accessed through port 80 by default.
An example of a physical ring topology would be what?
An example of a physical ring topology would be what?
The cable in the box is a _____ cable.
The cable in the box is a _____ cable.
In which type of connection would a crossover cable be used?
In which type of connection would a crossover cable be used?
What is indicated by the portion of the diagram labeled 'A'?
What is indicated by the portion of the diagram labeled 'A'?
What is indicated by the portion of the diagram labeled 'B'?
What is indicated by the portion of the diagram labeled 'B'?
What is indicated by the portion of the diagram labeled 'C'?
What is indicated by the portion of the diagram labeled 'C'?
A mesh network has to have termination points at both ends of the network.
A mesh network has to have termination points at both ends of the network.
What is the physical topology of the mentioned network?
What is the physical topology of the mentioned network?
How many connections are there among the routers?
How many connections are there among the routers?
Which two types of servers are typically placed in a perimeter network?
Which two types of servers are typically placed in a perimeter network?
What must be changed to receive an IP address from the DHCP service on the router?
What must be changed to receive an IP address from the DHCP service on the router?
How should the DNS address be obtained after setting DHCP?
How should the DNS address be obtained after setting DHCP?
Match the following ping commands with their descriptions:
Match the following ping commands with their descriptions:
Match the following cable types with their speed capacities:
Match the following cable types with their speed capacities:
Which two options are valid IP addresses you could assign to a computer on the same network as a router configured with an interface of 192.168.1.100?
Which two options are valid IP addresses you could assign to a computer on the same network as a router configured with an interface of 192.168.1.100?
What does 'WAN' refer to in networking?
What does 'WAN' refer to in networking?
In which directions can communication occur between layers of the OSI model? (Choose three)
In which directions can communication occur between layers of the OSI model? (Choose three)
Which three layers on the OSI model make up the Application layer on the TCP model? (Choose three)
Which three layers on the OSI model make up the Application layer on the TCP model? (Choose three)
What is the physical topology of this network?
What is the physical topology of this network?
What is indicated by the ranges 192.168.0.0 - 192.168.255.255?
What is indicated by the ranges 192.168.0.0 - 192.168.255.255?
What is indicated by the ranges 224.0.0.0 - 239.255.255.255?
What is indicated by the ranges 224.0.0.0 - 239.255.255.255?
What is indicated by the ranges 75.0.0.0 - 75.255.255.255?
What is indicated by the ranges 75.0.0.0 - 75.255.255.255?
You should use a _____ cable to connect each computer to the hub.
You should use a _____ cable to connect each computer to the hub.
You should use a _____ cable to connect each hub to the switch.
You should use a _____ cable to connect each hub to the switch.
What is the primary disadvantage of a bus topology?
What is the primary disadvantage of a bus topology?
Which IP address in a routing table signifies a default route?
Which IP address in a routing table signifies a default route?
Which is a characteristic of peer to peer networks?
Which is a characteristic of peer to peer networks?
What best describes a virtual machine?
What best describes a virtual machine?
Which tool should you use to test if your Ethernet cables are wired correctly?
Which tool should you use to test if your Ethernet cables are wired correctly?
Which type of wireless network does not have a centralized device, such as a wireless access point or wireless router?
Which type of wireless network does not have a centralized device, such as a wireless access point or wireless router?
Which role needs to be added to an on-premises Windows Server in order to enable routing through the server?
Which role needs to be added to an on-premises Windows Server in order to enable routing through the server?
What is the local address in IPv6?
What is the local address in IPv6?
Flashcards
TCP
TCP
The main protocol in the Transport layer of the TCP model.
Network Troubleshooting Initial Step
Network Troubleshooting Initial Step
Identifying the network problem.
Ping
Ping
Tests connectivity to a destination IP address.
Traceroute
Traceroute
Signup and view all the flashcards
Host Command
Host Command
Signup and view all the flashcards
Netstat
Netstat
Signup and view all the flashcards
Single-mode fiber
Single-mode fiber
Signup and view all the flashcards
Layer 2 Switch
Layer 2 Switch
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Secondary DNS Server
Secondary DNS Server
Signup and view all the flashcards
AAAA Records
AAAA Records
Signup and view all the flashcards
HOSTS File
HOSTS File
Signup and view all the flashcards
Default Gateway
Default Gateway
Signup and view all the flashcards
IPv6 Tunneling
IPv6 Tunneling
Signup and view all the flashcards
VLAN
VLAN
Signup and view all the flashcards
ipconfig /all
ipconfig /all
Signup and view all the flashcards
VPN
VPN
Signup and view all the flashcards
Second-level domain
Second-level domain
Signup and view all the flashcards
Firewall Traffic Filtering
Firewall Traffic Filtering
Signup and view all the flashcards
Router Layer
Router Layer
Signup and view all the flashcards
Full Duplex
Full Duplex
Signup and view all the flashcards
Site-to-site VPN
Site-to-site VPN
Signup and view all the flashcards
Network Component Functions
Network Component Functions
Signup and view all the flashcards
Private Network Addresses
Private Network Addresses
Signup and view all the flashcards
Study Notes
Transport Layer
- TCP is the main protocol in the Transport layer of the TCP model.
Troubleshooting Steps
- The initial step in diagnosing network problems in small to medium-sized businesses is identifying the issue.
Network Commands
- Ping tests connectivity to a destination IP address.
- Traceroute displays IP addresses along the path from source to destination.
- The host command performs DNS lookups.
- Netstat reveals open and listening ports on a device.
Network Cabling
- Single-mode fiber cables can carry signals over the longest distances.
Layer 2 Switches
- A layer 2 switch is also known as a bridge.
- Layer 2 switches do not use routing tables and flood ports when the destination is unknown.
Firewalls
- Firewalls can be either hardware devices or software packages, but they are not physical rooms for server protection.
DNS and HOSTS File
- A secondary name server obtains data from another server via zone transfer.
- AAAA records resolve hostnames to IPv6 addresses.
- Entries in a HOSTS file take precedence over DNS entries.
Network Connectivity Issue
- A common issue for users unable to connect to a specific network is the absence of a default gateway; configuring a default gateway in the appropriate network can resolve this.
IPv6 Tunneling
- ISATAP and Teredo are tunneling protocols for transmitting IPv6 information over IPv4.
VLAN Configuration
- To enable communication among a group of computers located in different areas, configure a Virtual Local Area Network (VLAN).
IP Addressing Tools
- The command
ipconfig /all
displays detailed IP and DHCP server information.
Secure Communications
- Virtual Private Networks (VPNs) are used to secure messages over public networks from unauthorized access.
Domain Names
- An example of a second-level domain is "in-addr.arpa".
Traffic Filtering by Firewalls
- Firewalls primarily filter traffic based on ports and protocols.
Router Functionality
- Routers operate primarily at the Network layer, not the Data Link layer.
Connection Types
- Full duplex connections allow simultaneous sending and receiving of data.
VPN Types
- Site-to-site VPNs are used to connect two networks for collaboration.
Network Component Functions
- Firewalls control data packet access, Remote Access Servers authenticate users, DHCP distributes IP addresses, NAT manages private IP routing, and VPNs facilitate secure communications over public networks.
Internet Connection Types
- Cable modems use shared broadband, DSL uses dedicated lines, and ISDN employs two 64Kbps channels.
Router and NAT Functions
- A router separates multiple networks; NAT translates private IP addresses to public ones; VLAN configurations typically occur on switches, not routers.
Common Ports
- Port 25 is used for email, while ports 80 and 443 are used for unsecured and secured web traffic respectively.
Topology Considerations
- Ring topology is often mistaken for star topology; the physical topology of a network can significantly affect performance and reliability.
Networking Standards
- A crossover cable is used to connect similar devices, like switch to switch, while straight-through cables connect dissimilar devices, like computers to switches.
Network Address Ranges
- Private network addresses range from 192.168.0.0 to 192.168.255.255, multicast addresses from 224.0.0.0 to 239.255.255.255, and public network addresses cover the remainder.
Bus Topology Disadvantage
- A major drawback of bus topology is its reliance on a single cable, representing a single point of failure.
Default Routing
- The default route in a routing table is indicated by the address 0.0.0.0.
Peer-to-Peer Networks
- Peer-to-peer networks typically connect 10 or fewer devices, allowing direct communication between users.
Virtual Machines
- Virtual machines enable multiple operating systems to run on a single physical computer, enhancing resource utilization.
Cable Testing
- A cable tester is essential for verifying the correct wiring of Ethernet cables.
Wireless Networking
- Ad hoc networks operate without centralized devices like routers or access points.
Routing on Windows Servers
- To enable routing on an on-premises Windows Server, the Remote Access role must be added.
IPv6 Local Address
- The local IPv6 address (::1) is the loopback address, analogous to 127.0.0.1 in IPv4.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on core networking concepts, including the Transport layer, common network commands, and cabling types. This quiz covers everything from TCP to firewalls, ensuring you have a comprehensive understanding of network fundamentals.