Podcast
Questions and Answers
Layer 6 of the OSI model is also referred to as:
Layer 6 of the OSI model is also referred to as:
- Presentation layer (correct)
- Transport layer
- Session layer
- Application layer
Which of the following reside at the physical layer of the OSI model? (Select 2 answers)
Which of the following reside at the physical layer of the OSI model? (Select 2 answers)
- Hub (correct)
- Router
- Switch
- Network cabling (correct)
- Bridge
How long is a MAC address?
How long is a MAC address?
- 6 hexadecimal characters
- 32 bits
- 6 binary digits
- 48 bits (correct)
Which layer of the OSI model is the only layer divided into two sublayers?
Which layer of the OSI model is the only layer divided into two sublayers?
Which layer of the OSI model opens and closes conversations between applications?
Which layer of the OSI model opens and closes conversations between applications?
A MAC address is also known as a(n) __________ address:
A MAC address is also known as a(n) __________ address:
One function of a NIC is to:
One function of a NIC is to:
Routers function at which layer of the OSI model?
Routers function at which layer of the OSI model?
Which OSI model layer resends packets that were not received in good order?
Which OSI model layer resends packets that were not received in good order?
In the OSI model, physical addressing takes place at the:
In the OSI model, physical addressing takes place at the:
What device connects subnets?
What device connects subnets?
What is the name of a data unit used at the OSI physical layer?
What is the name of a data unit used at the OSI physical layer?
How many layers does the OSI model contain?
How many layers does the OSI model contain?
Frames in most wired networks hold at most __________.
Frames in most wired networks hold at most __________.
OSI layer 7 is also known as:
OSI layer 7 is also known as:
For a network technician, one benefit of understanding the OSI seven-layer model is using it as a primary tool for __________.
For a network technician, one benefit of understanding the OSI seven-layer model is using it as a primary tool for __________.
Which type of cable works best for long-distance transmissions?
Which type of cable works best for long-distance transmissions?
Which cable type suffers from electromagnetic interference (EMI)?
Which cable type suffers from electromagnetic interference (EMI)?
Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield?
Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield?
Which layer in the three-tier hierarchical model network architecture facilitates traffic between end devices and the rest of the network?
Which layer in the three-tier hierarchical model network architecture facilitates traffic between end devices and the rest of the network?
What layer in three-tier model network architecture is considered the backbone of a network?
What layer in three-tier model network architecture is considered the backbone of a network?
Because most networks can run at speeds of up to 1000 Mbps, most new cabling installations use which category of cabling?
Because most networks can run at speeds of up to 1000 Mbps, most new cabling installations use which category of cabling?
Which connector is currently used in wired networks, but commonly refered to as RJ-45?
Which connector is currently used in wired networks, but commonly refered to as RJ-45?
What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps?
What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps?
What is the primary use of coaxial cable in networking today?
What is the primary use of coaxial cable in networking today?
What is the space between the acoustical tile ceiling in an office building and the actual concrete ceiling above called?
What is the space between the acoustical tile ceiling in an office building and the actual concrete ceiling above called?
What is the meaning of the “10” in 10BASE-T?
What is the meaning of the “10” in 10BASE-T?
How long is the start frame delimiter?
How long is the start frame delimiter?
Which mechanism will move a port into a root-inconsistent state if BPDUs coming from a certain direction indicate another switch is trying to become the root bridge?
Which mechanism will move a port into a root-inconsistent state if BPDUs coming from a certain direction indicate another switch is trying to become the root bridge?
What is an advantage of fiber-optic cabling?
What is an advantage of fiber-optic cabling?
What kind of cabling did the 10BASE-FL standard specify?
What kind of cabling did the 10BASE-FL standard specify?
Which statement best describes the preamble of an Ethernet frame?
Which statement best describes the preamble of an Ethernet frame?
In a specification such as 10BASE-T, what does the word “BASE” identify?
In a specification such as 10BASE-T, what does the word “BASE” identify?
How many fields does a basic Ethernet frame contain?
How many fields does a basic Ethernet frame contain?
What is the minimum size of an Ethernet frame?
What is the minimum size of an Ethernet frame?
The 802.3 working group defines wired network standards that share the same basic frame type and __________.
The 802.3 working group defines wired network standards that share the same basic frame type and __________.
What information is included in the data portion of an Ethernet frame on an IP network?
What information is included in the data portion of an Ethernet frame on an IP network?
How many pins does an RJ-45 connector have?
How many pins does an RJ-45 connector have?
What is the maximum cable length on a segment of a 1000BASE-T network?
What is the maximum cable length on a segment of a 1000BASE-T network?
The “W” in the standard 10GBASE-SW stands for which type of signaling?
The “W” in the standard 10GBASE-SW stands for which type of signaling?
Which term refers to the 100-Mbps standards, even though there are now much faster versions of Ethernet available?
Which term refers to the 100-Mbps standards, even though there are now much faster versions of Ethernet available?
Which very high-speed fiber network was already in place and being used for wide area networking (WAN) transmissions before the IEEE developed the 10 GbE Ethernet standards?
Which very high-speed fiber network was already in place and being used for wide area networking (WAN) transmissions before the IEEE developed the 10 GbE Ethernet standards?
What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?
What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?
What is the name of the IEEE standard for 10 GbE running on twisted pair cabling?
What is the name of the IEEE standard for 10 GbE running on twisted pair cabling?
What is the most common connector used in a 1000BASE-SX network?
What is the most common connector used in a 1000BASE-SX network?
The different colors of the laser signals transmitted over fiber-optic cables feature different __________.
The different colors of the laser signals transmitted over fiber-optic cables feature different __________.
The __________—(technically called the intermediate distribution frame (IDF)—is where all the horizontal runs from all the work areas come together.
The __________—(technically called the intermediate distribution frame (IDF)—is where all the horizontal runs from all the work areas come together.
The physical location where connections come in from the outside world is known as the __________.
The physical location where connections come in from the outside world is known as the __________.
The most commonly used type of patch panel currently in use is the __________.
The most commonly used type of patch panel currently in use is the __________.
What are the three essential ingredients for a successful implementation of a basic structured cabling network?
What are the three essential ingredients for a successful implementation of a basic structured cabling network?
A box with a row of ports in front and permanent connections to horizontal cabling in the back is called a __________?
A box with a row of ports in front and permanent connections to horizontal cabling in the back is called a __________?
One function of a NIC is to __________.
One function of a NIC is to __________.
What is the typical maximum size of an Ethernet frame's payload?
What is the typical maximum size of an Ethernet frame's payload?
The 802.3 working group defines wired network standards that share the same basic frame type and what other key element?
The 802.3 working group defines wired network standards that share the same basic frame type and what other key element?
Within an Ethernet frame used on an IP network, what key information is contained in the data portion of the frame?
Within an Ethernet frame used on an IP network, what key information is contained in the data portion of the frame?
What three elements are essential for a successful basic structured cabling network?
What three elements are essential for a successful basic structured cabling network?
How many pins are found on a standard RJ-45 connector?
How many pins are found on a standard RJ-45 connector?
A technician needs to connect horizontal cabling to a central point. Which of the following devices would they use?
A technician needs to connect horizontal cabling to a central point. Which of the following devices would they use?
If cabling runs from the telecommunications room connect directly to end-user computers, what is it referred to as?
If cabling runs from the telecommunications room connect directly to end-user computers, what is it referred to as?
What is the maximum specified cable length for a segment of 1000BASE-T network?
What is the maximum specified cable length for a segment of 1000BASE-T network?
In the 10GBASE-SW standard, what does the 'W' signify regarding the type of signaling used?
In the 10GBASE-SW standard, what does the 'W' signify regarding the type of signaling used?
In a network infrastructure, where does the responsibility of the business owner for maintaining the network typically begin?
In a network infrastructure, where does the responsibility of the business owner for maintaining the network typically begin?
Which term is commonly used to refer to the 100-Mbps Ethernet standards, even though faster Ethernet versions are now prevalent?
Which term is commonly used to refer to the 100-Mbps Ethernet standards, even though faster Ethernet versions are now prevalent?
How many bits make up an IPv4 address?
How many bits make up an IPv4 address?
Before the IEEE developed 10 Gigabit Ethernet (10 GbE) standards, which high-speed fiber network was already in place and utilized for wide area networking (WAN) transmissions?
Before the IEEE developed 10 Gigabit Ethernet (10 GbE) standards, which high-speed fiber network was already in place and utilized for wide area networking (WAN) transmissions?
Which well-known port number is typically used by HTTP web servers for unencrypted communication?
Which well-known port number is typically used by HTTP web servers for unencrypted communication?
What is the valid range of decimal values for each octet (group of numbers) in a standard IPv4 address?
What is the valid range of decimal values for each octet (group of numbers) in a standard IPv4 address?
Which protocol is used by web browsers and web servers for communication on the World Wide Web?
Which protocol is used by web browsers and web servers for communication on the World Wide Web?
Which set of terms best describes common roles within a network system architecture, defining how different components interact?
Which set of terms best describes common roles within a network system architecture, defining how different components interact?
What type of network configuration logically divides a physical network into multiple, isolated networks without requiring additional physical hardware?
What type of network configuration logically divides a physical network into multiple, isolated networks without requiring additional physical hardware?
Which mode of operation allows an Intrusion Detection System (IDS) to examine a duplicate of every network packet?
Which mode of operation allows an Intrusion Detection System (IDS) to examine a duplicate of every network packet?
What Cisco tool is used to facilitate DHCP requests across different network segments?
What Cisco tool is used to facilitate DHCP requests across different network segments?
Which of the following encryption algorithms is considered a stream cipher?
Which of the following encryption algorithms is considered a stream cipher?
Which protocol, standardized by IEEE, is commonly used for link aggregation across different vendors equipment?
Which protocol, standardized by IEEE, is commonly used for link aggregation across different vendors equipment?
What is the primary function of encryption in data transmission?
What is the primary function of encryption in data transmission?
What name is given to a switch port configured to carry traffic for all VLANs in a Local Area Network (LAN)?
What name is given to a switch port configured to carry traffic for all VLANs in a Local Area Network (LAN)?
What type of identifier is typically appended to the term 'VLAN' to create a unique VLAN name?
What type of identifier is typically appended to the term 'VLAN' to create a unique VLAN name?
Which of the following is a critical component for establishing a secure HTTPS connection?
Which of the following is a critical component for establishing a secure HTTPS connection?
A trunk port associates untagged traffic with which VLAN?
A trunk port associates untagged traffic with which VLAN?
Which of the following represents the correct order of a fully qualified domain name (FQDN)?
Which of the following represents the correct order of a fully qualified domain name (FQDN)?
A newer series of protection applications combining features traditionally managed by separate applications is best described as:
A newer series of protection applications combining features traditionally managed by separate applications is best described as:
Which protocol provides a framework for Authentication, Authorization, and Accounting (AAA) services?
Which protocol provides a framework for Authentication, Authorization, and Accounting (AAA) services?
Which one is least likely to be an original top-level domain name?
Which one is least likely to be an original top-level domain name?
What is the standard UDP port number that DNS servers primarily utilize for responding to queries?
What is the standard UDP port number that DNS servers primarily utilize for responding to queries?
At which layer of the OSI model does IPSec primarily function to provide authentication and encryption?
At which layer of the OSI model does IPSec primarily function to provide authentication and encryption?
Which of the following best describes the primary use of cryptographic hash functions regarding file management?
Which of the following best describes the primary use of cryptographic hash functions regarding file management?
What type of information is stored within the DNS resolver cache to improve the efficiency of future DNS lookups?
What type of information is stored within the DNS resolver cache to improve the efficiency of future DNS lookups?
Which of these terms describes a dedicated file server commonly found within networks, that offers its storage via network?
Which of these terms describes a dedicated file server commonly found within networks, that offers its storage via network?
Upon booting up, a computer using NetBIOS broadcasts which piece of information along with its MAC address?
Upon booting up, a computer using NetBIOS broadcasts which piece of information along with its MAC address?
Which DNS server software is most commonly used on UNIX/Linux systems for domain name resolution?
Which DNS server software is most commonly used on UNIX/Linux systems for domain name resolution?
Windows DNS server is the default resolver and name server for which Microsoft technology, designed for managing enterprise networks?
Windows DNS server is the default resolver and name server for which Microsoft technology, designed for managing enterprise networks?
Which of the following is a necessary component of a fully qualified domain name (FQDN)?
Which of the following is a necessary component of a fully qualified domain name (FQDN)?
Which of the following protocols uses port 25 by default?
Which of the following protocols uses port 25 by default?
What is the range of port numbers typically assigned to well-known ports?
What is the range of port numbers typically assigned to well-known ports?
A client is unable to access a website. Pinging the IP address of the website is successful, but pinging the domain name fails. What is the most likely cause of this issue?
A client is unable to access a website. Pinging the IP address of the website is successful, but pinging the domain name fails. What is the most likely cause of this issue?
Which of the following is the role of top-level domain (TLD) servers in the DNS hierarchy?
Which of the following is the role of top-level domain (TLD) servers in the DNS hierarchy?
In a fully qualified domain name (FQDN) like host.example.com
, what does each section of the name represent?
In a fully qualified domain name (FQDN) like host.example.com
, what does each section of the name represent?
Which action is performed by DNS root servers?
Which action is performed by DNS root servers?
Your organization's website is www.example.com
. Which DNS record type is responsible for mapping this hostname to an IPv4 address?
Your organization's website is www.example.com
. Which DNS record type is responsible for mapping this hostname to an IPv4 address?
When troubleshooting DNS resolution issues, which command is most helpful for querying DNS servers and displaying detailed results including the time it took for the server to respond?
When troubleshooting DNS resolution issues, which command is most helpful for querying DNS servers and displaying detailed results including the time it took for the server to respond?
Layer 6 of the OSI model is also referred to as:
Layer 6 of the OSI model is also referred to as:
When data is encapsulated before transmission, which OSI layer is the first to add addressing information?
When data is encapsulated before transmission, which OSI layer is the first to add addressing information?
A network administrator notices that a large number of packets are being retransmitted. Which OSI layer is MOST likely responsible for this?
A network administrator notices that a large number of packets are being retransmitted. Which OSI layer is MOST likely responsible for this?
Which of the following is the most accurate description of how the Data Link Layer uses physical addresses (MAC addresses)?
Which of the following is the most accurate description of how the Data Link Layer uses physical addresses (MAC addresses)?
A user reports that they can access websites by IP address but not by domain name. Which OSI layer function is most likely affected?
A user reports that they can access websites by IP address but not by domain name. Which OSI layer function is most likely affected?
Which statement accurately describes the relationship between the Network Layer and the Transport Layer in the OSI model?
Which statement accurately describes the relationship between the Network Layer and the Transport Layer in the OSI model?
A technician is troubleshooting a network and wants to capture all traffic to and from a specific computer. At which layer of the OSI model does the technician typically configure a packet sniffer to capture this traffic?
A technician is troubleshooting a network and wants to capture all traffic to and from a specific computer. At which layer of the OSI model does the technician typically configure a packet sniffer to capture this traffic?
Which of the following is a key distinction between TCP and UDP, in terms of the OSI model?
Which of the following is a key distinction between TCP and UDP, in terms of the OSI model?
Which of the following scenarios illustrates a function performed at the Presentation Layer of the OSI model?
Which of the following scenarios illustrates a function performed at the Presentation Layer of the OSI model?
How many bytes is the minimum size of an Ethernet frame, including the header and FCS?
How many bytes is the minimum size of an Ethernet frame, including the header and FCS?
The 802.3 working group defines wired network standards that share the same basic frame type and the same __________.?
The 802.3 working group defines wired network standards that share the same basic frame type and the same __________.?
When installing Ethernet cabling in environments susceptible to high electromagnetic interference (EMI), which cabling type is most suitable?
When installing Ethernet cabling in environments susceptible to high electromagnetic interference (EMI), which cabling type is most suitable?
What is the formal designation for the IEEE standard that defines 10 Gigabit Ethernet (10GbE) over twisted pair cabling?
What is the formal designation for the IEEE standard that defines 10 Gigabit Ethernet (10GbE) over twisted pair cabling?
In a 1000BASE-SX network, which connector type is most commonly used for terminating fiber optic cables?
In a 1000BASE-SX network, which connector type is most commonly used for terminating fiber optic cables?
The 'R' in the 10GBASE-SR standard corresponds to which type of networking environment?
The 'R' in the 10GBASE-SR standard corresponds to which type of networking environment?
Regarding fiber-optic cables, how do different colors of laser light used for transmission vary from one another?
Regarding fiber-optic cables, how do different colors of laser light used for transmission vary from one another?
In a structured cabling system, which area serves as the central aggregation point for horizontal cabling runs extending from work areas?
In a structured cabling system, which area serves as the central aggregation point for horizontal cabling runs extending from work areas?
In a network infrastructure, what term refers to the physical point where the external communication lines connect with the internal network systems?
In a network infrastructure, what term refers to the physical point where the external communication lines connect with the internal network systems?
What is the valid range of decimal values for an octet in a standard IPv4 address?
What is the valid range of decimal values for an octet in a standard IPv4 address?
Web browsers and web servers primarily use which protocol to communicate?
Web browsers and web servers primarily use which protocol to communicate?
Which formula calculates the number of usable hosts on a subnet, where 'x' represents the number of zeroes in the subnet mask?
Which formula calculates the number of usable hosts on a subnet, where 'x' represents the number of zeroes in the subnet mask?
In a Class C network, which octets are commonly used to define the network ID?
In a Class C network, which octets are commonly used to define the network ID?
If the first octet of an IP address falls between 128 and 191 (inclusive), to which IP class does it belong?
If the first octet of an IP address falls between 128 and 191 (inclusive), to which IP class does it belong?
Which data transmission protocol establishes a connection before transmitting data, ensuring reliable delivery?
Which data transmission protocol establishes a connection before transmitting data, ensuring reliable delivery?
What type of transmission allows a single computer to send a message directly to another specific computer?
What type of transmission allows a single computer to send a message directly to another specific computer?
Which type of network communication sends data to every device on a local network segment?
Which type of network communication sends data to every device on a local network segment?
Which Transport Layer protocol is used by both DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) for their operations?
Which Transport Layer protocol is used by both DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) for their operations?
Which of the following IP addresses falls within the reserved private IP address range, as defined by RFC 1918?
Which of the following IP addresses falls within the reserved private IP address range, as defined by RFC 1918?
What command-line utility can be used to test the basic network configuration of a device by sending packets to its own address?
What command-line utility can be used to test the basic network configuration of a device by sending packets to its own address?
Which type of network transmission allows one host to send data to a defined group of hosts?
Which type of network transmission allows one host to send data to a defined group of hosts?
What is the primary networking protocol suite used by Apple macOS-based systems for network communication?
What is the primary networking protocol suite used by Apple macOS-based systems for network communication?
Which service automatically assigns IP addresses to devices on a network?
Which service automatically assigns IP addresses to devices on a network?
The Internet Protocol (IP) primarily operates and provides addressing at which layer of the OSI model?
The Internet Protocol (IP) primarily operates and provides addressing at which layer of the OSI model?
How many layers exist in the OSI model?
How many layers exist in the OSI model?
What is the maximum payload size that frames in most wired networks can hold?
What is the maximum payload size that frames in most wired networks can hold?
Which of the following is another name for OSI layer 7?
Which of the following is another name for OSI layer 7?
What is a key benefit of understanding the OSI seven-layer model for a network technician?
What is a key benefit of understanding the OSI seven-layer model for a network technician?
Which type of cable is most suitable for long-distance data transmissions due to its low attenuation and high bandwidth?
Which type of cable is most suitable for long-distance data transmissions due to its low attenuation and high bandwidth?
When manufacturers connect two fibers together to meet the demand for two-pair cabling, what type of fiber-optic cabling results?
When manufacturers connect two fibers together to meet the demand for two-pair cabling, what type of fiber-optic cabling results?
Which type of cable is most susceptible to electromagnetic interference (EMI)?
Which type of cable is most susceptible to electromagnetic interference (EMI)?
Which cable type consists of a central conductor surrounded by insulating material and a braided metal shield?
Which cable type consists of a central conductor surrounded by insulating material and a braided metal shield?
In the three-tier hierarchical network model, which layer provides connectivity and facilitates traffic flow between end devices and other parts of the network?
In the three-tier hierarchical network model, which layer provides connectivity and facilitates traffic flow between end devices and other parts of the network?
Within the three-tier hierarchical network architecture, which layer serves as the high-speed backbone of the network?
Within the three-tier hierarchical network architecture, which layer serves as the high-speed backbone of the network?
For new cabling installations supporting network speeds up to 1000 Mbps, which category of cabling is commonly used?
For new cabling installations supporting network speeds up to 1000 Mbps, which category of cabling is commonly used?
What is the formal name for the connector commonly referred to as RJ-45, which is used in wired networks?
What is the formal name for the connector commonly referred to as RJ-45, which is used in wired networks?
What is the minimum UTP cabling category rating required to support a network running at 1000 Mbps?
What is the minimum UTP cabling category rating required to support a network running at 1000 Mbps?
In contemporary networking, what is the typical application of coaxial cable?
In contemporary networking, what is the typical application of coaxial cable?
In building infrastructure, what is the architectural term for the space between a suspended ceiling and the structural floor above?
In building infrastructure, what is the architectural term for the space between a suspended ceiling and the structural floor above?
Which type of Network Address Translation (NAT) hides the internal IP addresses of a network by mapping them to a single public IP address, using different port numbers?
Which type of Network Address Translation (NAT) hides the internal IP addresses of a network by mapping them to a single public IP address, using different port numbers?
Which routing protocol tends to be favored in large enterprise internal networks due to its vendor-neutral nature and open standard?
Which routing protocol tends to be favored in large enterprise internal networks due to its vendor-neutral nature and open standard?
What metric is employed to define the largest data packet that a network technology can efficiently transmit without fragmentation?
What metric is employed to define the largest data packet that a network technology can efficiently transmit without fragmentation?
What address does a router primarily use to determine the appropriate path for an incoming data packet?
What address does a router primarily use to determine the appropriate path for an incoming data packet?
What is the general term for the protocols used for communication within an Autonomous System (AS)?
What is the general term for the protocols used for communication within an Autonomous System (AS)?
Which of the following terms describes each instance when a packet passes through a router?
Which of the following terms describes each instance when a packet passes through a router?
What kind of protocol enables different Autonomous Systems (AS) to exchange routing information with each other across the Internet?
What kind of protocol enables different Autonomous Systems (AS) to exchange routing information with each other across the Internet?
What file transfer protocol operates over UDP and listens on port 69?
What file transfer protocol operates over UDP and listens on port 69?
What term refers to a server storing data related to the current connection with a client?
What term refers to a server storing data related to the current connection with a client?
A port within what numerical range is assigned dynamically by the operating system for client-side communication?
A port within what numerical range is assigned dynamically by the operating system for client-side communication?
When a port is actively sending and receiving data as part of a working communication channel, what is its state?
When a port is actively sending and receiving data as part of a working communication channel, what is its state?
What type of network communication involves an initial handshake process to establish a connection before data transmission?
What type of network communication involves an initial handshake process to establish a connection before data transmission?
What term describes any single stream of data exchanged between two computers in a network?
What term describes any single stream of data exchanged between two computers in a network?
What message does the ping
command typically return when a response is not received from the target device within the expected timeframe?
What message does the ping
command typically return when a response is not received from the target device within the expected timeframe?
At what layer of the OSI model does the Internet Control Message Protocol (ICMP) operate to transmit connectionless control and information messages?
At what layer of the OSI model does the Internet Control Message Protocol (ICMP) operate to transmit connectionless control and information messages?
Which of the following actions is performed by DNS root servers?
Which of the following actions is performed by DNS root servers?
Which task is handled by top-level domain (TLD) servers?
Which task is handled by top-level domain (TLD) servers?
Which organization introduced numerous generic TLDs like .biz
and .rodeo
?
Which organization introduced numerous generic TLDs like .biz
and .rodeo
?
What is a fundamental requirement for hosts on the Internet regarding IP addresses?
What is a fundamental requirement for hosts on the Internet regarding IP addresses?
Which DNS record type identifies the authoritative name server for a domain?
Which DNS record type identifies the authoritative name server for a domain?
Which command-line tool is most useful for diagnosing DNS-related issues?
Which command-line tool is most useful for diagnosing DNS-related issues?
What is the correct order of elements in a fully qualified domain name (FQDN)?
What is the correct order of elements in a fully qualified domain name (FQDN)?
Which of the following is considered an original top-level domain name?
Which of the following is considered an original top-level domain name?
What is the standard UDP port number used by DNS servers for querying and responding to requests?
What is the standard UDP port number used by DNS servers for querying and responding to requests?
What type of information is stored within a DNS resolver cache?
What type of information is stored within a DNS resolver cache?
When a computer using NetBIOS starts up, what information does it broadcast along with its MAC address?
When a computer using NetBIOS starts up, what information does it broadcast along with its MAC address?
Which Microsoft technology integrates the Windows DNS server for enterprise network management?
Which Microsoft technology integrates the Windows DNS server for enterprise network management?
Which of the following is a required component of a fully qualified domain name (FQDN)?
Which of the following is a required component of a fully qualified domain name (FQDN)?
Which protocol is most likely to supersede FTP for secure data transfers?
Which protocol is most likely to supersede FTP for secure data transfers?
Which of the following is an industry standard protocol that provides centralized Authentication, Authorization, and Accounting (AAA) for network access?
Which of the following is an industry standard protocol that provides centralized Authentication, Authorization, and Accounting (AAA) for network access?
Which term describes a standardized format containing a public key and the digital signature of a trusted certification authority, used to verify the authenticity of a website or application?
Which term describes a standardized format containing a public key and the digital signature of a trusted certification authority, used to verify the authenticity of a website or application?
Which protocol provides a directory service that allows applications to access and manage distributed directory information over an IP network?
Which protocol provides a directory service that allows applications to access and manage distributed directory information over an IP network?
What term represents the mathematical process or set of rules used to perform encryption or decryption?
What term represents the mathematical process or set of rules used to perform encryption or decryption?
What is the term used for combining multiple network connections in parallel to increase throughput beyond what a single connection could sustain?
What is the term used for combining multiple network connections in parallel to increase throughput beyond what a single connection could sustain?
When configuring VLAN Trunking Protocol (VTP) on a network, which three operational modes can be assigned to network switches to manage VLAN information?
When configuring VLAN Trunking Protocol (VTP) on a network, which three operational modes can be assigned to network switches to manage VLAN information?
What type of network architecture virtually separates a physical network into multiple isolated broadcast domains without requiring additional physical infrastructure?
What type of network architecture virtually separates a physical network into multiple isolated broadcast domains without requiring additional physical infrastructure?
Which intrusion detection system (IDS) mode operates by analyzing a duplicate of network traffic, ensuring that real-time network performance is not affected?
Which intrusion detection system (IDS) mode operates by analyzing a duplicate of network traffic, ensuring that real-time network performance is not affected?
What specific Cisco IOS feature is used to forward DHCP broadcast requests from a VLAN to a DHCP server residing on another network?
What specific Cisco IOS feature is used to forward DHCP broadcast requests from a VLAN to a DHCP server residing on another network?
Which proprietary Cisco protocol is used to negotiate the automatic formation of EtherChannel links?
Which proprietary Cisco protocol is used to negotiate the automatic formation of EtherChannel links?
What kind of port on a network switch is configured to carry traffic for multiple VLANs, enabling inter-VLAN communication by tagging frames?
What kind of port on a network switch is configured to carry traffic for multiple VLANs, enabling inter-VLAN communication by tagging frames?
When configuring VLANs, what unique identifier is commonly appended to the term 'VLAN' to distinguish between different virtual networks?
When configuring VLANs, what unique identifier is commonly appended to the term 'VLAN' to distinguish between different virtual networks?
On a trunk port, if an Ethernet frame arrives without a VLAN tag, which VLAN does the switch associate the traffic with?
On a trunk port, if an Ethernet frame arrives without a VLAN tag, which VLAN does the switch associate the traffic with?
For remote management of a network switch, which network configuration parameter must be assigned to the switch?
For remote management of a network switch, which network configuration parameter must be assigned to the switch?
Which switch feature allows network administrators to duplicate network traffic from one or more ports to a designated monitoring port for analysis?
Which switch feature allows network administrators to duplicate network traffic from one or more ports to a designated monitoring port for analysis?
Flashcards
Presentation Layer
Presentation Layer
Layer 6 of the OSI model; responsible for data formatting, encryption, and compression.
Physical Layer Devices
Physical Layer Devices
Physical layer devices, such as hubs and cabling, transmit raw data.
MAC Address
MAC Address
A unique hardware address of a network interface card, 48 bits long.
Data Link Layer Sublayers
Data Link Layer Sublayers
Signup and view all the flashcards
Session Layer
Session Layer
Signup and view all the flashcards
Physical Address
Physical Address
Signup and view all the flashcards
Cyclic Redundancy Check (CRC)
Cyclic Redundancy Check (CRC)
Signup and view all the flashcards
Routers
Routers
Signup and view all the flashcards
Reliable Transport
Reliable Transport
Signup and view all the flashcards
Physical Addressing
Physical Addressing
Signup and view all the flashcards
Router
Router
Signup and view all the flashcards
Bit
Bit
Signup and view all the flashcards
OSI Model Layers
OSI Model Layers
Signup and view all the flashcards
Ethernet Frame Size
Ethernet Frame Size
Signup and view all the flashcards
OSI Layer 7
OSI Layer 7
Signup and view all the flashcards
OSI Model Benefit
OSI Model Benefit
Signup and view all the flashcards
Fiber-Optic Cable
Fiber-Optic Cable
Signup and view all the flashcards
Duplex Fiber Cabling
Duplex Fiber Cabling
Signup and view all the flashcards
Electromagnetic Interference (EMI)
Electromagnetic Interference (EMI)
Signup and view all the flashcards
Coaxial Cable
Coaxial Cable
Signup and view all the flashcards
Access/Edge Layer
Access/Edge Layer
Signup and view all the flashcards
Core Layer
Core Layer
Signup and view all the flashcards
Cat 5e
Cat 5e
Signup and view all the flashcards
8P8C
8P8C
Signup and view all the flashcards
Cat 5e minimum
Cat 5e minimum
Signup and view all the flashcards
Primary use for Coaxial Cable
Primary use for Coaxial Cable
Signup and view all the flashcards
Access/Edge Layer
Access/Edge Layer
Signup and view all the flashcards
Plenum
Plenum
Signup and view all the flashcards
10 in 10BASE-T
10 in 10BASE-T
Signup and view all the flashcards
Start Frame Length
Start Frame Length
Signup and view all the flashcards
Root Guard
Root Guard
Signup and view all the flashcards
Fiber Optic Advantage
Fiber Optic Advantage
Signup and view all the flashcards
Ethernet Frame Preamble
Ethernet Frame Preamble
Signup and view all the flashcards
BASE in Ethernet
BASE in Ethernet
Signup and view all the flashcards
Ethernet Frame Fields
Ethernet Frame Fields
Signup and view all the flashcards
Minimum Ethernet Frame Size
Minimum Ethernet Frame Size
Signup and view all the flashcards
802.3 Wired Networks
802.3 Wired Networks
Signup and view all the flashcards
Data in Ethernet Frame
Data in Ethernet Frame
Signup and view all the flashcards
RJ-45 Pins
RJ-45 Pins
Signup and view all the flashcards
1000BASE-T Max Length
1000BASE-T Max Length
Signup and view all the flashcards
10GBASE-SW Meaning of 'W'
10GBASE-SW Meaning of 'W'
Signup and view all the flashcards
Fast Ethernet
Fast Ethernet
Signup and view all the flashcards
Pre-existing High-Speed Fiber Network
Pre-existing High-Speed Fiber Network
Signup and view all the flashcards
Ethernet Cabling in High EMI
Ethernet Cabling in High EMI
Signup and view all the flashcards
10GBASE-T Standard
10GBASE-T Standard
Signup and view all the flashcards
1000BASE-SX Connector
1000BASE-SX Connector
Signup and view all the flashcards
"R" in 10GBASE-SR
"R" in 10GBASE-SR
Signup and view all the flashcards
Fiber Laser Signal Colors
Fiber Laser Signal Colors
Signup and view all the flashcards
Horizontal Runs End
Horizontal Runs End
Signup and view all the flashcards
Physical Connection Point
Physical Connection Point
Signup and view all the flashcards
Most Common Patch Panel
Most Common Patch Panel
Signup and view all the flashcards
Structured Cabling Ingredients
Structured Cabling Ingredients
Signup and view all the flashcards
Port Row Box
Port Row Box
Signup and view all the flashcards
Cables Room to Computers
Cables Room to Computers
Signup and view all the flashcards
Business Owner Responsibility
Business Owner Responsibility
Signup and view all the flashcards
IPv4 Address Bits Binary
IPv4 Address Bits Binary
Signup and view all the flashcards
HTTP Web Server Port
HTTP Web Server Port
Signup and view all the flashcards
IPv4 Address Range
IPv4 Address Range
Signup and view all the flashcards
Web Communication Protocol
Web Communication Protocol
Signup and view all the flashcards
Subnet Hosts Formula
Subnet Hosts Formula
Signup and view all the flashcards
Port 21
Port 21
Signup and view all the flashcards
Port 22
Port 22
Signup and view all the flashcards
Port 23
Port 23
Signup and view all the flashcards
Port 25
Port 25
Signup and view all the flashcards
Well-known Ports
Well-known Ports
Signup and view all the flashcards
Port 80
Port 80
Signup and view all the flashcards
TFTP Transport Protocol
TFTP Transport Protocol
Signup and view all the flashcards
Top-Level Domain Servers
Top-Level Domain Servers
Signup and view all the flashcards
FQDN order
FQDN order
Signup and view all the flashcards
Top-Level Domain
Top-Level Domain
Signup and view all the flashcards
DNS UDP Port
DNS UDP Port
Signup and view all the flashcards
DNS Resolver Cache
DNS Resolver Cache
Signup and view all the flashcards
NetBIOS Broadcast
NetBIOS Broadcast
Signup and view all the flashcards
Popular DNS Server
Popular DNS Server
Signup and view all the flashcards
Windows DNS Server
Windows DNS Server
Signup and view all the flashcards
FQDN Component
FQDN Component
Signup and view all the flashcards
802.3 Network Access
802.3 Network Access
Signup and view all the flashcards
Ethernet Frame Data
Ethernet Frame Data
Signup and view all the flashcards
RJ-45 Connector Pins
RJ-45 Connector Pins
Signup and view all the flashcards
1000BASE-T Cable Length
1000BASE-T Cable Length
Signup and view all the flashcards
10GBASE-SW 'W' Meaning
10GBASE-SW 'W' Meaning
Signup and view all the flashcards
Fast Ethernet Definition
Fast Ethernet Definition
Signup and view all the flashcards
SONET
SONET
Signup and view all the flashcards
Ethernet Shielding
Ethernet Shielding
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Certificate
Certificate
Signup and view all the flashcards
Network Access Control (NAC)
Network Access Control (NAC)
Signup and view all the flashcards
RADIUS
RADIUS
Signup and view all the flashcards
IPSec
IPSec
Signup and view all the flashcards
File Integrity
File Integrity
Signup and view all the flashcards
Network Attached Storage (NAS)
Network Attached Storage (NAS)
Signup and view all the flashcards
Algorithm
Algorithm
Signup and view all the flashcards
Virtual LAN (VLAN)
Virtual LAN (VLAN)
Signup and view all the flashcards
Promiscuous Mode
Promiscuous Mode
Signup and view all the flashcards
IP Helper
IP Helper
Signup and view all the flashcards
Port Aggregation Protocol (PAgP)
Port Aggregation Protocol (PAgP)
Signup and view all the flashcards
Trunk Port
Trunk Port
Signup and view all the flashcards
VLAN ID
VLAN ID
Signup and view all the flashcards
Native VLAN
Native VLAN
Signup and view all the flashcards
IP Address
IP Address
Signup and view all the flashcards
Telecommunications Room (IDF)
Telecommunications Room (IDF)
Signup and view all the flashcards
Demarcation Point (Demarc)
Demarcation Point (Demarc)
Signup and view all the flashcards
110 Block
110 Block
Signup and view all the flashcards
Horizontal Cabling
Horizontal Cabling
Signup and view all the flashcards
Patch Panel
Patch Panel
Signup and view all the flashcards
IPv4 Decimal Range
IPv4 Decimal Range
Signup and view all the flashcards
Study Notes
OSI Model & Addressing
- Layer 6 of the OSI model is the Presentation layer.
- Hub, Switch, and Network cabling reside at the physical layer of the OSI model.
- A MAC address is 48 bits long.
- The Data Link layer is the only layer of the OSI model divided into two sublayers.
- The application layer of the OSI model opens and closes conversations between applications.
- A MAC address is also known as a physical address.
- One function of a NIC is to utilize network protocols for data transfer between the PC and the network.
- Routers function at the Network layer of the OSI model.
- The Transport layer of the OSI model resends packets that were not received in good order.
- Physical addressing takes place at the Data Link layer in the OSI model.
Network Devices & Cabling
- A bridge connects subnets.
- A bit is the name of a data unit used at the OSI physical layer.
- The OSI model contains 7 layers.
- Frames in most wired networks hold at most 1500 bytes of data.
- OSI layer 7 is also known as the Application layer.
- Understanding the OSI seven-layer model benefits network technicians by offering it as a primary tool for troubleshooting networks.
- Fiber-optic cable works best for long-distance transmissions.
- In response to the demand for two-pair cabling, manufacturers often connect two fibers together to create duplex fiber-optic cabling.
- Unshielded twisted pair (UTP) cable suffers from electromagnetic interference (EMI).
- The cable described as a central conductor wire surrounded by insulating materials and placed inside a braided metal shield is coaxial cable.
Network Architecture
- The Distribution/Aggregation layer facilitates traffic between end devices and the rest of the network in the three-tier hierarchical model network architecture.
- The core layer is considered the backbone of a network in three-tier model network architecture.
- Most new cabling installations use Cat 5e or Cat 6 cabling because most networks can run at speeds of up to 1000 Mbps.
- The 8P8C connector is currently used in wired networks but is commonly referred to as RJ-45.
- The minimum category rating of UTP cabling for a network that runs at 1000 Mbps is Cat 5e.
- The primary use of coaxial cable in networking today is connecting a cable modem to an Internet service provider (ISP).
- The Access/Edge layer facilitates traffic between end devices and traffic to and from the rest of the network in the three-tier hierarchical model.
- The space between the acoustical tile ceiling in an office building and the actual concrete ceiling above is called the plenum.
- The "10" in 10BASE-T signifies a maximum speed of 10 Mbps.
- The start frame delimiter is 1 byte long.
- Root guard will move a port into a root-inconsistent state if BPDUs coming from a direction indicate another switch is trying to become the root bridge.
- A key advantage of fiber-optic cabling is the greater maximum distance it can cover.
- The 10BASE-FL standard specified fiber-optic cabling.
- The preamble of an Ethernet frame includes a 7-byte series of alternating ones and zeros followed by a start frame delimiter.
- In a specification such as 10BASE-T, "BASE" identifies signaling type.
- A basic Ethernet frame contains nine fields.
- The minimum size of an Ethernet frame is 64 bytes.
- The 802.3 working group defines wired network standards that share the same basic frame type and network access method.
- The data portion of an Ethernet frame on an IP network includes padding information.
- An RJ-45 connector has eight pins.
- The maximum cable length on a segment of a 1000BASE-T network is 100 meters.
- In the standard 10GBASE-SW, "W" stands for SONET/WAN signaling.
- Fast Ethernet refers to the 100-Mbps standards.
- Very high-speed fiber network was already in place and being used for wide area networking (WAN) transmissions before the IEEE developed the 10 GbE Ethernet standards: SONET.
- A technician will most likely use shielded twisted pair (STP) cabling when installing Ethernet cabling in areas with high electrical interference.
- The IEEE standard for 10 GbE running on twisted pair cabling is 10GBASE-T.
- The most common connector used in a 1000BASE-SX network is LC.
- A technician is most likely to use shielded twisted pair (STP) when installing Ethernet cabling in areas with high electrical interference.
- The “R” in the standard 10GBASE-SR stands for LAN signaling.
- The different colors of the laser signals transmitted over fiber-optic cables feature different wavelengths.
- Horizontal runs from all work areas come together at the telecommunications room, technically called the intermediate distribution frame (IDF).
- The physical location where connections come in from the outside world is known as the demarcation point (demarc).
- The most commonly used type of patch panel is the 110 block.
- The three essential ingredients for a successful implementation of a basic structured cabling network are: telecommunications room, horizontal cabling, and a work area.
- A box with a row of ports in front and permanent connections to horizontal cabling in the back is called a patch panel.
- Cables running from the telecommunication room to the computers are referred to as horizontal cabling.
- The box where the responsibility of the business owner begins is referred to as the demarcation point (demarc).
- IPv4 address has 32 binary digits.
Protocols & Addressing
- HTTP Web servers use port 80.
- The range of decimal values in each of the four groups of an IPv4 address is 0 to 255.
- Web servers and Web browsers use HTTP to communicate.
- The formula to arrive at the number of hosts on a subnet is 2x - 2, where x represents the number of zeroes in the subnet mask.
- A Class C network block uses the first three octets to define the network ID.
- If the first decimal value of an IP address is between 128 and 191, the network belongs to Class B.
- TCP is a connection-oriented protocol.
- Unicast allows one computer to send a message directly to another.
- Broadcast allows every computer on the LAN to hear the message.
- Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) use UDP.
- 10.164.19.5 is a private IP address.
- The command to tell a device to send packets to itself is ping 127.0.0.1.
- Multicast allows a single computer to send a packet to a group of interested computers.
- Apple systems use TCP/IP network protocol today.
- Dynamic IP addressing via the Dynamic Host Configuration Protocol (DHCP) automatically assigns an IP address whenever a computer connects to the network
- The Internet Protocol corresponds to the Network layer.
- 192.168.4.2 is a valid IP address for an individual host expressed in dotted decimal notation.
- Border Gateway Protocol (BGP-4) is used on the Internet for communication between Autonomous Systems.
- Traceroute records the route between any two hosts on a network.
- EIGRP was originally a Cisco proprietary protocol.
- Cisco IOS is the name of Cisco's proprietary operating system.
- Static NAT maps a single routable IP address to a single machine, enabling access to that machine from outside the network.
- RIPv2 was adopted in 1994 and is now considered obsolete except for small, private WANs.
- A routing table gateway value of 0.0.0.0 indicates that no gateway is needed for a network ID.
- Bandwidth refers to the ability of one connection to handle more data than others.
- Network Management Software (NMS) is a tool used by an administrator to manage many routers and provide an overview of all the network.
- Dynamic NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers.
- Port address translation (PAT) typically handles one-to-many connections in NAT.
- OSPF is a choice for routing protocol in most large enterprise internal networks because it has always been vendor neutral.
- Maximum transmission unit is used to determine the largest frame size a particular technology can handle.
- A router determines where an incoming packet should go by looking at the packet's destination IP address.
- Interior Gateway Protocols (IGPs) are used by the network or networks within an AS to communicate with protocols.
- Hop refers to the passage of a packet through a router.
- Exterior Gateway Protocol (EGP) is used by Autonomous Systems to communicate with each other.
- TFTP uses UDP port 69 for file transfer.
- Session refers to session information stored by a computer on one side of a session.
- Registered ports range from 1024 to 49151.
- Established Port describes the status of a port that is part of an active, working endpoint pair.
- Connection-oriented describes a communication process where two computers first acknowledge each other before communicating and close the communication afterward.
- Port is used for any single communication between a computer and another computer.
- If no echo reply is received before the default time when pinging a device, ping will respond with a "request timed out" message.
- The Internet Control Message Protocol (ICMP) works at Layer 3 to deliver connectionless packets.
- TCP involves a three-way handshake.
- ICMP is popular for moving files across a LAN, where the chances of losing packets are small.
- A particular multicast called an IGMP group is assigned an address in the Class D range.
- Telnet runs on TCP port 23.
- Well-known is the name given to port numbers in the range of 0 to 1023.
- Web server is the TCP/IP application that uses port 80.
- Trivial File Transfer Protocol (TFTP) uses UDP.
- A Web client's source port number is classically assigned as a dynamic port, generated pseudo-randomly.
- Ping works with the IP address but not the name associated with that address confirms a DNS problem.
- Second-level domain servers refers to the DNS servers just below the DNS root in DNS hierarchy.
- In DNS naming convention, each name is separated by a period (.).
- DNS root servers delegate to domain-specific name servers
- ICANN has added hundreds of generic TLDs, like .biz and .rodeo
- IP addresses must be unique for hosts on the Internet.
- The server holding records (zone) for a DNS tree part is pointed to by an NS record.
- Cache is very helpful when testing DNS.
- The correct sequence for writing a fully qualified domain name (FQDN) is host.domain.root.
- .mil is an original top-level domain name.
- DNS servers primarily use UDP port 53.
- The DNS resolver cache stores IP addresses that have already been resolved.
- A computer broadcasts its NetBIOS name along with its MAC address when booted up using NetBIOS.
- BIND is the most popular DNS server used in UNIX/Linux systems.
- Active Directory is Microsoft's default DNS server.
- Host name is part of a fully qualified domain name (FQDN).
Network Security
- Secure Copy Protocol (SCP) enables secure data transfers between two hosts and might have replaced FTP.
- Ciphertext refers to the result of running plaintext through a cipher algorithm using a key.
- Authorization defines what an authenticated person can do with data.
- Asymmetric-key algorithms use two different keys, one to encrypt and one to decrypt.
- Advanced Encryption Standard (AES) is the most common block cipher.
- Encryption means to scramble, mix up, or change data so that it is unreadable to unauthorized users but descrambled by the intended recipient.
- You won't get an HTTPS connection without a good certificate exchange.
- Network access control (NAC) defines newer protection applications combining features traditionally done separately.
- RADIUS provides authentication, authorization, and accounting.
- IPSec is an authentication and encryption protocol suite working at the Network layer of the OSI seven-layer model.
- Cryptographic hash functions are commonly used for verifying file integrity.
- Network attached storage (NAS) is a type of dedicated file server used in many networks.
- A certificate is a standardized file that holds a public key and the digital signature of a trusted third party.
- LDAP is the tool programs use to query and change a database used by the network.
- Algorithm refers to a cipher's underlying mathematical formula.
- Port aggregation is another name for port bonding.
- Transparent, server, and client are the three states that can be applied to switches using VLAN Trunking Protocol (VTP).
- Virtual local area network (VLAN) enables segmentation of a physical network into discrete networks without additional hardware.
- Promiscuous mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network.
- IP helper is a tool that Cisco uses to implement DHCP relay.
- Port Aggregation Protocol (PAgP) is the Cisco protocol for accomplishing aggregation.
VLANs & Switch Configuration
- Trunk port describes a port on a switch configured to carry all traffic, regardless of VLAN number, between all switches in a LAN.
- A number is typically appended to the word “VLAN” in order for a VLAN to get its name.
- A trunk port associates native VLAN ID untagged traffic with its VLAN.
- A managed switch needs an IP address to enable configuration through the network.
- Port mirroring refers to the capability of a switch to copy data from any or all physical ports to a single physical port.
- Load balancing refers to creating a server cluster.
- Content switching is possible on Layer 7 of the OSI model.
- IEEE 802.1Q enables different manufacturers to connect switches.
Subnetting
- If you borrow 10 bits of Class B network, you can create 1024 subnets
- 85 in binary is 01010101
- The following are network IDs: 160.160.160.0/20, 160.160.160.0/28,
- If you borrow 5 bits of a Class C network, you can create 32 subnets.
- 10101010 in decimal equals 170.
- A network with a subnet mask of 255.255.255.240 would have the prefix /28.
- If you needed a network that would provide for 20 hosts, you would have to have 5 host bits.
- The host range for 192.168.32.32 /30 is 192.168.32.33 -192.168.32.34
- 192.168.24.26 with a subnet mask 255.255.255.240 is a valid host on network 192.168.24.0/29
- The increment of a /29 is 8.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Key concepts of the OSI model, including layer functions and networking components. Explains MAC addresses, the role of the Data Link layer, and the functions of routers and NICs. Covers data transfer protocols and physical addressing within the OSI model.