Networking Fundamentals Chapter 1
71 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following terms describes a network arrangement where five servers are connected to a hard disk array using a dedicated Fibre Channel network?

  • SAN (correct)
  • WAN
  • MAN
  • PAN
  • Which of the following is not a technology typically used for a personal area network (PAN)?

  • Z-Wave
  • Bluetooth
  • SDWAN (correct)
  • NFC
  • Which of the following network topologies are used by Wireless Local Area Networks (WLANs)? (Select all that apply)

  • Star
  • Ad hoc (correct)
  • Bus
  • Infrastructure (correct)
  • Which cabling topology was used by the first Ethernet networks?

    <p>Bus</p> Signup and view all the answers

    On an Ethernet network using the star topology, which device(s) can function as the cabling nexus in the center of the star?

    <p>Switch</p> Signup and view all the answers

    Which of the following options would Alice find to be a valid upgrade path to Gigabit Ethernet?

    <p>Replace the CAT5 cable with at least CAT5e or CAT6, and replace the 100Base-T switch with a 1000Base-T switch.</p> Signup and view all the answers

    Which Ethernet physical layer specification can Ralph use for the new network to provide the fastest transmission speeds without replacing the cable?

    <p>1000Base-T</p> Signup and view all the answers

    Which IEEE standards for Ethernet support 10-megabit-per-second (Mbps) communications?

    <p>10Base-T; segment maximum is 100 meters</p> Signup and view all the answers

    Which of the following implementations should Ed recommend to the client to upgrade the network infrastructure to the fastest Ethernet standard possible while keeping costs to a minimum?

    <p>Upgrade to 1000Base-T and keep the existing hubs.</p> Signup and view all the answers

    Which pinouts must Ralph use when creating the patch cables based on the T568B standard? White/orange, orange, white/green, blue, white/blue, ____, ____, ____

    <p>green, white/brown, brown</p> Signup and view all the answers

    Match the following IPv4 address classes:

    <p>1.1.1.1 = Class A 229.6.87.3 = Class D 103.256.77.4 = Invalid 9.34.0.1 = Class A</p> Signup and view all the answers

    Dual stack implies a computer with connections to two different network segments.

    <p>True</p> Signup and view all the answers

    Which of the following technologies enables the IP addresses assigned to clients by a Dynamic Host Configuration Protocol (DHCP) server to be automatically added to the DNS namespace?

    <p>Dynamic DNS</p> Signup and view all the answers

    Which of the following is a tool that integrates DHCP and DNS so that each is aware of the changes made by the other?

    <p>IPAM</p> Signup and view all the answers

    Which of the following is the term used to describe the logical distance of a Network Time Protocol (NTP) server from the time source to which it is synchronized?

    <p>Stratum</p> Signup and view all the answers

    Which of the following protocols is used to synchronize computer clocks to a time signal provided by a server?

    <p>NTP</p> Signup and view all the answers

    Which of the words in the fully qualified domain name (FQDN) www.paris.mydomain.org represents the topmost layer in the DNS namespace hierarchy?

    <p>org</p> Signup and view all the answers

    Which of the following Dynamic Host Configuration Protocol (DHCP) options prevents the client from transmitting IP datagrams that circulate endlessly around the network?

    <p>Default IP TTL</p> Signup and view all the answers

    In designing a network for a client, Ed has decided to use both internal and external DNS servers. Which of the following resources should Ed register with the external DNS server? (Choose all that apply.)

    <p>Internet web servers</p> Signup and view all the answers

    How many subnets can he create, and how many hosts can he create per subnet?

    <p>30 subnets and 1022 hosts</p> Signup and view all the answers

    Convert the binary mask 11111111.11111111.11100000.00000000 into its equivalent decimal value. What is the decimal representation of this mask?

    <p>255.255.248.0</p> Signup and view all the answers

    If you have an IPv4 network address of 192.168.1.32/27, what is the valid range of host addresses you can use for your workstations?

    <p>192.168.1.33 through 192.168.1.62</p> Signup and view all the answers

    Alice has been assigned the IPv4 network address 172.21.0.0/22 for the creation of a new department network in her company. How many host addresses does she have available to her?

    <p>1022</p> Signup and view all the answers

    Automatic Private IP Addressing (APIPA) assigns IPv4 addresses from which of the following classes to Dynamic Host Configuration Protocol (DHCP) clients that cannot contact a DHCP server?

    <p>Class C</p> Signup and view all the answers

    Which of the following Internet Protocol (IPv4) address classes identifies multicast addresses?

    <p>Class D</p> Signup and view all the answers

    Which of the following is an address that you can assign to a host on a private IPv4 network?

    <p>172.16.255.255</p> Signup and view all the answers

    Which of the following is the correct subnet mask for an IPv4 network with the address 172.16.0.0/20?

    <p>255.255.224.0</p> Signup and view all the answers

    Ed has been assigned the IPv4 network address 192.168.2.32/28 for the computers in his department. Which of the following ranges of addresses can Ed use to configure the TCP/IP clients on his computers?

    <p>192.168.2.33 to 192.168.2.40</p> Signup and view all the answers

    Which of the following IPv4 addresses is available for use on a network device?

    <p>234.9.76.32</p> Signup and view all the answers

    Which of the following IPv6 address types is the functional equivalent of an IPv4 APIPA address?

    <p>Link local</p> Signup and view all the answers

    When two workstations access the Internet using the same Port Address Translation (PAT) router, which of the following does the router assign to each workstation? (Choose all that apply)

    <p>A unique port number</p> Signup and view all the answers

    Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling? (Choose all that apply)

    <p>6to4</p> Signup and view all the answers

    Which of the following solutions best meets the client’s needs?

    <p>Install CAT6 or CAT6a UTP cable for the LANs and use multimode fiber-optic cable for the backbone network.</p> Signup and view all the answers

    Without knowing which LAN the severed cable belongs to, what is the maximum number of computers that could be directly affected by the cable break?

    <p>1</p> Signup and view all the answers

    In the punchdown process for Unshielded Twisted Pair (UTP) cable, which of the following is the last step that you perform when connecting bulk cables to jacks in wall plates and patch panels?

    <p>Cut off the excess wire that protrudes past the contacts.</p> Signup and view all the answers

    Which of the following cable connector types is not used with fiber-optic cable?

    <p>F-type</p> Signup and view all the answers

    Which of the following twisted pair cable types can you use to construct a 10GBase-T network with 100-meter segments?

    <p>CAT6</p> Signup and view all the answers

    Which of the following cable connector types have been rendered nearly obsolete by Universal Serial Bus (USB) connections?

    <p>DB-25</p> Signup and view all the answers

    Which of the following twisted pair cable types is rated for both a 10-megabit-per-second (Mbps) data rate and a 100 Mbps data rate?

    <p>Category 5e (CAT5e)</p> Signup and view all the answers

    Ed has been hired to install network cabling for a small private company with 15 employees who need to share files and printers. Which combination of topology, cable type, and installation method would best meet the needs of Ed’s client?

    <p>Bus topology, twisted pair cabling, and internal installation</p> Signup and view all the answers

    Which of the following cable types are typically used in newly constructed Local Area Network (LAN) installations?

    <p>Unshielded twisted pair</p> Signup and view all the answers

    Which of the following statements are true about coaxial cable?

    <p>Coaxial cable has two conductors within the same sheath.</p> Signup and view all the answers

    Which of the following twisted pair cable types are rated for 1000 megabit-per-second (Mbps) Gigabit Ethernet using two wire pairs?

    <p>Category 6 (CAT6)</p> Signup and view all the answers

    Which of the following twisted pair cable types support both 10-megabit-per-second (Mbps) and 100 Mbps data rates, using only two pairs?

    <p>Category 5 (CAT5)</p> Signup and view all the answers

    Which of the following statements about fiber-optic cabling are true?

    <p>Fiber-optic cable is typically used to span long distances.</p> Signup and view all the answers

    Which of the following are characteristics of an internal cable installation?

    <p>An internal cable installation uses stranded wire conductors for short cable runs and solid core for longer cable runs.</p> Signup and view all the answers

    Which of the following Ethernet specifications calls for CAT8 UTP cable exclusively?

    <p>40GBase-T</p> Signup and view all the answers

    Ralph has been hired to connect three Local Area Networks (LANs) together with redundant paths that form a fault-tolerant backbone. Which topology, cable type, and installation method are best suited for this network?

    <p>Star topology, coaxial cabling, and external installation</p> Signup and view all the answers

    Alice is a network consultant evaluating a network design to support 20 workstations for an inventory database application. Which statement about the proposal is true?

    <p>The solution achieves the primary goal and one of the secondary goals.</p> Signup and view all the answers

    Ed is a network consultant designing a network for a new manufacturing plant. Which is not a valid reason for choosing fiber optic over UTP for this project?

    <p>The 225-meter distance between the two most distant computers exceeds Ethernet’s maximum cable segment length for UTP.</p> Signup and view all the answers

    In the 100Base-TX specification, what are the functions of the Fast Link Pulse (FLP) signals exchanged by switches and network interface adapters?

    <p>The FLP signals verify the integrity of the connection between the devices.</p> Signup and view all the answers

    Which 10 Gigabit Ethernet specification calls for the use of copper cable?

    <p>10GBase-CX4</p> Signup and view all the answers

    Alice is a network consultant upgrading an existing Ethernet network to Gigabit Ethernet. Which cable type is currently installed?

    <p>Category 5 (CAT5)</p> Signup and view all the answers

    At which of the following layers of the Open Systems Interconnection (OSI) model do the protocols on a typical local area network (LAN) use media access control (MAC) addresses to identify other computers on the network?

    <p>Data link</p> Signup and view all the answers

    Which of the following organizations developed the Open Systems Interconnection (OSI) model?

    <p>International Organization for Standardization (ISO)</p> Signup and view all the answers

    Which of the following statements best describes the difference between Type I and Type II virtualization?

    <p>In Type I virtualization, the hypervisor runs directly on the physical computer hardware, whereas in Type II virtualization, a host operating system runs on the computer hardware and the hypervisor runs on top of the host OS.</p> Signup and view all the answers

    On which of the following virtual networking components can you create VLANs?

    <p>Virtual switch</p> Signup and view all the answers

    Which of the following components is responsible for providing a virtualized hardware environment and running virtual machines?

    <p>Hypervisor</p> Signup and view all the answers

    Which of the following is the proper term for a computer with a hypervisor on which you can create virtual machines and other virtual components?

    <p>Host</p> Signup and view all the answers

    In which of the following ways does a vSwitch (virtual switch) differ from a physical switch?

    <p>Physical switches typically support the creation of VLANs, whereas virtual switches do not.</p> Signup and view all the answers

    In which of the following components can a virtual firewall be implemented?

    <p>All of the above</p> Signup and view all the answers

    What is the valid range of numbers for the well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports used by servers?

    <p>1 through 49151</p> Signup and view all the answers

    Which of the following new protocols should Ralph expect to see in his network traffic analysis after installing the new email server?

    <p>IMAP</p> Signup and view all the answers

    Which of the following values could a web client use as an ephemeral port number when communicating with a web server?

    <p>1024</p> Signup and view all the answers

    Which of the following protocols provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model?

    <p>TCP</p> Signup and view all the answers

    Which of the following protocols is limited to use on the local subnet only?

    <p>Address Resolution Protocol (ARP)</p> Signup and view all the answers

    Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?

    <p>HTTPS://</p> Signup and view all the answers

    What is the difference when you specify the HTTPS:// prefix in a Uniform Resource Locator (URL) instead of HTTP://?

    <p>The connection between the web browser and the server is encrypted.</p> Signup and view all the answers

    You want to access the web server application's administrative site from your remote office with an encrypted connection using port 12354. Which of the following URLs should you use?

    <p><a href="https://www.adatum.com:12354">https://www.adatum.com:12354</a></p> Signup and view all the answers

    Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?

    <p>ESP</p> Signup and view all the answers

    Which of the following are the protocols that IPsec uses to secure network traffic?

    <p>ESP</p> Signup and view all the answers

    Study Notes

    OSI Model

    • The OSI model is a 7-layered framework for designing and implementing computer networks
    • The layers are:
      • Physical (Layer 1): defines the medium, network interfaces, and signaling methods
      • Data Link (Layer 2): controls the frame, provides error detection and correction
      • Network (Layer 3): routes data between nodes, provides logical addressing
      • Transport (Layer 4): provides reliable data transfer, segmentation, and flow control
      • Session (Layer 5): establishes, manages, and terminates connections
      • Presentation (Layer 6): translates data, provides encryption and compression
      • Application (Layer 7): provides services to end-user applications

    Network Topologies

    • Bus: a single cable connects all devices in a linear sequence
    • Star: all devices connect to a central hub or switch
    • Ring: devices connect in a circular configuration
    • Mesh: each device connects to every other device
    • Hybrid: combines two or more topologies

    Network Types

    • WAN (Wide Area Network): connects multiple LANs over a large geographic area
    • LAN (Local Area Network): connects devices in a limited geographic area
    • MAN (Metropolitan Area Network): connects multiple LANs in a metropolitan area
    • PAN (Personal Area Network): connects devices in a small area, such as a home or office
    • WLAN (Wireless Local Area Network): connects devices wirelessly in a LAN

    Network Devices

    • Hub: a simple network device that connects multiple devices
    • Bridge: connects two networks together
    • Switch: connects multiple devices, filters and forwards frames
    • Router: connects multiple networks, routes data between them

    Network Protocols

    • TCP/IP: a suite of protocols used in the Internet
    • IP: provides logical addressing and routing
    • ICMP: provides error messaging and diagnostic functions
    • IGMP: provides multicast group management
    • HTTP: a protocol for transferring data over the Internet

    Network Technologies

    • DSL (Digital Subscriber Line): a technology for broadband Internet access
    • SONET (Synchronous Optical Network): a high-speed network technology
    • ISDN (Integrated Services Digital Network): a technology for digital communication
    • ADSL (Asymmetrical Digital Subscriber Line): a technology for broadband Internet access
    • Cable television (CATV): a technology for broadband Internet access

    Network Cabling

    • Twisted pair: a type of cabling that uses twisted pairs of wires
    • Coaxial: a type of cabling that uses a copper core surrounded by insulation
    • Fiber optic: a type of cabling that uses light to transmit data
    • Hybrid: combines two or more types of cabling

    WAN Connection Technologies

    • Leased line: a dedicated, point-to-point connection
    • Dial-up: a connection that uses a modem to dial into a network
    • ISDN: a technology for digital communication
    • ADSL: a technology for broadband Internet access
    • Cable television (CATV): a technology for broadband Internet access

    Network Security

    • Firewall: a device that controls access to a network
    • VPN (Virtual Private Network): a secure, encrypted connection over the Internet
    • Authentication: the process of verifying the identity of a user or device
    • Encryption: the process of securing data by converting it into a code### Networking Fundamentals

    Synchronous Data Transmissions

    • SONET (Synchronous Optical Networking) is a standard for synchronous data transmissions that defines data rates designated by optical carrier levels, such as OC-3, OC-12, OC-48, and OC-192.
    • SDH (Synchronous Digital Hierarchy) is the European equivalent of SONET.

    Wide Area Networking

    • Frame relay is a wide area networking mechanism that assigns labels to packets and forwards them based on those labels, rather than addresses.
    • MPLS (Multiprotocol Label Switching) is a technology that can replace leased lines, such as T-1s, by multiplexing signals as packets switched through virtual circuits in a cloud.
    • ATM (Asynchronous Transfer Mode) is a wide area networking technology that uses a switched fabric that was called a cloud long before the term came into general use.

    Network Devices

    • A CSU/DSU (Channel Service Unit/Data Service Unit) is a device that provides the interface between a Local Area Network (LAN) and a Wide Area Network (WAN).
    • A SIP trunk (Session Initiation Protocol trunk) is a device that provides a connection between a LAN and a WAN.
    • A vSwitch (virtual switch) is a software product that enables virtual machines running on the same hypervisor to communicate with each other internally.

    Virtual Networking

    • Type I virtualization is a type of virtualization where the hypervisor runs directly on the physical computer hardware.
    • Type II virtualization is a type of virtualization where a host operating system runs on the computer hardware and the hypervisor runs on top of the host OS.
    • A virtual firewall can be implemented in a host operating system, a guest operating system, or in a dedicated virtual machine.

    Network Topology

    • Bus topology uses a single cable to connect all devices in a network.
    • Star topology uses a central device, such as a hub or switch, to connect all devices in a network.

    Cabling

    • RG-8 is a type of coaxial cable used for Thick Ethernet network segments.
    • RG-58 is a type of coaxial cable used for Thin Ethernet network segments.
    • Twisted pair cable is used for Gigabit Ethernet networks and is configured in a star topology.
    • Fiber-optic cable is used for single-mode and multimode fiber-optic networks.
    • UTP (Unshielded Twisted Pair) cable is a type of twisted pair cable that is commonly used for Ethernet networks.

    Connectors

    • RJ-45 is a type of connector used for twisted pair cable.
    • BNC is a type of connector used for coaxial cable.
    • ST is a type of connector used for fiber-optic cable.
    • SC is a type of connector used for fiber-optic cable.
    • F-type is a type of connector used for coaxial cable.

    Network Installation

    • Punchdown is a process of connecting bulk cables to jacks in wall plates and patch panels.
    • The last step in the punchdown process is to cut off the excess wire that protrudes past the contacts.

    Cable Standards

    • Category 5 (CAT5) is a type of twisted pair cable that is rated for 10/100 Mbps data rates.
    • Category 5e (CAT5e) is a type of twisted pair cable that is rated for 10/100/1000 Mbps data rates.
    • Category 6 (CAT6) is a type of twisted pair cable that is rated for 10/100/1000 Mbps data rates.
    • Category 6a (CAT6a) is a type of twisted pair cable that is rated for 10/100/1000/10,000 Mbps data rates.

    Other Networking Topics

    • DOCSIS (Data Over Cable Service Interface Specification) is a specification for cable broadband networks.
    • PPPoE (Point-to-Point Protocol over Ethernet) is a protocol used for establishing secured links between TCP/IP systems.
    • L2TP (Layer 2 Tunneling Protocol) is a protocol used for establishing secured links between TCP/IP systems.
    • IPsec (Internet Protocol Security) is a protocol used for establishing secured links between TCP/IP systems.### Networking Fundamentals

    Cables and Connectors

    • Bus topology uses RG-58 coaxial cables
    • Star topology uses twisted pair cabling (e.g. Category 5 (CAT5), Category 5e (CAT5e), Category 6 (CAT6)) and internal installation
    • Fiber-optic cabling uses single-mode and multimode fibers with ST and SC connectors

    Coaxial Cable

    • Coaxial cable has a copper core that carries electrical signals
    • Coaxial cable has three conductors within the same sheath
    • Coaxial cable has an insulating outer sheath made of PVC or Teflon

    Twisted Pair Cable

    • Category 3 (CAT3) supports up to 10 Mbps Ethernet
    • Category 5 (CAT5), Category 5e (CAT5e), Category 6 (CAT6), and Category 6a (CAT6a) support up to 1000 Mbps Gigabit Ethernet
    • Category 5 (CAT5) supports up to 100 Mbps Fast Ethernet

    Fiber-Optic Cable

    • Single-mode fiber-optic cable uses a laser light source and a glass core
    • Multimode fiber-optic cable uses a Light-Emitting Diode (LED) light source
    • Fiber-optic cables use ST and SC connectors

    Ethernet Specifications

    • 10GBase-T Ethernet specification uses copper cable
    • 100Base-TX Ethernet specification uses Category 5 (CAT5) twisted pair cable
    • 1000Base-T Ethernet specification uses Category 5e (CAT5e) or Category 6 (CAT6) twisted pair cable
    • 10GBase-LR Ethernet specification uses single-mode fiber-optic cable
    • 10GBase-SR Ethernet specification uses multimode fiber-optic cable

    Network Design

    • Star topology is suitable for a network with 20 workstations, scattered throughout a building
    • Fiber-optic cable is suitable for a network spanning long distances (e.g. 225 meters)
    • Gigabit Ethernet is suitable for a network with high-speed requirements

    Network Installation

    • Internal cable installation uses solid wire conductors for short cable runs and stranded wire conductors for long cable runs
    • External cable installation uses bulk spools of cabling with no connectors attached
    • Internal cable installation uses prefabricated cables with connectors attached for most cable runs

    Network Protocols

    • Wavelength Division Multiplexing (WDM) is a fiber-optic technique for carrying multiple signals on a single network medium
    • Network Address Translation (NAT) enables computers on a private IPv4 network to access the Internet using a registered IP address
    • Dual stack refers to a computer with two sets of networking protocols (e.g. IPv4 and IPv6)

    IP Addressing

    • IPv4 addresses are divided into Class A, Class B, Class C, Class D, and Class E
    • Class A addresses have a default subnet mask of 255.0.0.0
    • Class B addresses have a default subnet mask of 255.255.0.0
    • Class C addresses have a default subnet mask of 255.255.255.0
    • IPv6 addresses have 128 bits, represented in hexadecimal notation with colon separators

    Subnetting

    • Subnetting is a technique for dividing an IP network into smaller sub-networks
    • Classless Inter-Domain Routing (CIDR) is a standard for IPv4 addressing that includes the ability to create subnets using any number of IP address bits
    • Variable Length Subnet Masks (VLSM) is a technique for subnetting an IP network using a variable number of bits

    IPv6 Addressing

    • IPv6 addresses have a link-local address that begins with FE80
    • IPv6 addresses use 64-bit Extended Unique Identifier (EUI-64) values for interface identification

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers the basics of networking, including the OSI model and its layers. It tests your understanding of how data is transmitted over a network and how devices are identified.

    More Like This

    Use Quizgecko on...
    Browser
    Browser