Networking Exam Quiz PDF
Document Details
Uploaded by OutstandingLagrange
Tags
Summary
This document contains information about networking concepts, including devices like VLANs, bridges, routers, and protocols. It explains different types of networking topologies and components, covering topics like network segmentation and data transfer.
Full Transcript
**Logically separate networks within networks** --- VLAN (Virtual Local Area Network) **Devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame\'s MAC address** --- Bridge **Connectivity device that subdivides a net...
**Logically separate networks within networks** --- VLAN (Virtual Local Area Network) **Devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame\'s MAC address** --- Bridge **Connectivity device that subdivides a network into smaller logical pieces** --- Router **Plugs into a port and crosses over the transmit line to the receive line so that outgoing signals can be redirected into the computer for testing** --- Loopback plug **Holds incoming data and accommodates bursts of traffic** --- Buffer **A switch running in this mode reads a frame\'s header and decides where to forward the data before it receives the entire packet** --- Cut-through mode **A switch running in this mode reads the entire data frame into its memory and checks it for accuracy before transmitting the information** --- Store-and-forward mode **Capable of transferring data at up to 1 Gbps per data path** --- Gigabit Ethernet **Has no means to interpret the data they retransmit** --- Repeater **d. Reassembly** Reassembly is the process of reconstructing segmented data, typically seen in networking where data packets are broken down and then reassembled at the destination. **d. Static** Static routing is a technique in which a network administrator manually programs a router to use specific, predefined paths between nodes. It doesn\'t change unless manually updated. **c. Switch** A switch is a multiport connectivity device that directs data between nodes on a network by forwarding data to specific devices based on their MAC addresses. **a. Gateways** Gateways are combinations of networking hardware and software that connect two dissimilar kinds of networks, often performing protocol translation to enable communication between them. **d. ISOC (Internet Society)** ISOC oversees the IAB (Internet Architecture Board), which is responsible for guiding the development of internet protocols and architecture. **c. Bridge** A bridge can interpret physical addressing information by reading the MAC addresses in data frames and deciding whether to forward or filter the frames based on that information. **a. Dynamic**\ **c. Static** TCP/IP parameters can be assigned to network hosts either dynamically using DHCP (Dynamic Host Configuration Protocol) or statically by manually entering the parameters. **e. 172.29.29.254**\ **f. 10.20.30.40** These are valid IPv4 private IP addresses. Private IP address ranges for IPv4 are: - **10.0.0.0 to 10.255.255.255** - **172.16.0.0 to 172.31.255.255** - **192.168.0.0 to 192.168.255.255** **b. Network** IP (Internet Protocol) operates at the Network layer (Layer 3) of the OSI model. This layer is responsible for logical addressing and routing of data packets across networks. **a. PCIe (Peripheral Component Interconnect Express)** The PCIe bus is currently the most popular expansion board NIC (Network Interface Card) used in modern computers. **a. A private unicast address used for limited communication with neighboring nodes in the same link.** An IPv6 link-local address is used for communication within a single link and is not routable outside that link. It typically has the prefix **FE80::/10**. **d. Physical and Data Link** Network Interface Cards (NICs) operate at both the Physical layer (Layer 1) and the Data Link layer (Layer 2) of the OSI model. The Physical layer handles the actual transmission of data over a physical medium, while the Data Link layer manages node-to-node data transfer and error detection/correction. **d. hot-swappable** A hardware component that can be changed without disrupting operations is known as hot-swappable. This feature allows users to replace or add components without shutting down the system. **d. Data Link** Traditional switches operate at the Data Link layer (Layer 2) of the OSI model. They use MAC addresses to forward frames between devices within the same local area network (LAN). **d. VLANs (Virtual Local Area Networks)** Switches can create VLANs by grouping a number of ports into a broadcast domain, allowing for network segmentation and improved management of network traffic. **c. routing** The process of determining the best path from Point A on one network to Point B on another is known as routing. This involves the use of routing protocols to find the most efficient path for data packets to travel. **c. MAC (Media Access Control)** The MAC sublayer of the Data Link layer manages access to the physical medium, determining how devices on a network can communicate with each other and control the use of the shared medium. **d. content** Switches that operate anywhere between Layer 4 and Layer 7 of the OSI model are known as content switches. They can inspect and manage traffic based on application-level data, enabling features like load balancing and application delivery. The Application layer separates data into **Protocol data Units** or discrete amounts of data. This layer is responsible for providing network services directly to end-user applications, formatting and managing the data for transmission. A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) **interior** router. A network\'s **Maximum Transmission Unit (MTU)** represents the largest data unit the network will carry. The MTU defines the maximum size of a packet that can be sent over the network without fragmentation. A computer\'s **bus** is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer\'s components, including its memory, processor, hard disk, and NIC. A(n) **driver** is software that enables an attached device to communicate with the computer\'s operating system. Drivers act as intermediaries, translating commands and data between the device and the OS. A(n) **on-board** NIC (Network Interface Card) is integrated into the motherboard. This type of NIC is built into the system and does not require a separate expansion card. False True True false True **Incorporates many directly interconnected sites.**\ **Answer 1:** Mesh Network **Contains a single site acting as the central connection point for several other points.**\ **Answer 2:** Star Topology **Refers to the T-carrier\'s Physical layer electrical signaling characteristics as defined by ANSI standards in the early 1980s.**\ **Answer 3:** Signal level **Occurs when each site is directly connected to no more than two other sites in a serial fashion.**\ **Answer 4:** Linear Topology (or Bus Topology) **Provides equal capacity for data traveling both upstream and downstream.**\ **Answer 5:** Symmetric Bandwidth **Contain sites that are connected in star or ring formations are interconnected at different levels, with the interconnection points being organized into layers to form hierarchical groupings.**\ **Answer 6:** tiered topology WAN **Occurs when data travels from the carrier\'s switching facility to the customer.**\ **Answer 7:** Downstream Transmission **Occurs when data travels from the customer to the carrier\'s switching facility.**\ **Answer 8:** Upstream Transmission **Occurs when downstream throughput is higher than upstream throughput.**\ **Answer 9:** Asymmetric Bandwidth **c. Her email was hijacked.** This is because the coworker's email account was sending hundreds of emails without her knowledge, which typically indicates that someone gained unauthorized access to her account (hijacking) rather than merely spoofing her email address or being added to a botnet. The participation in a contest that likely required her email could have led to her account being compromised. **d. Install in Safe Mode.** Installing in Safe Mode can help because it starts Windows with a minimal set of drivers and services, which can prevent malware from interfering with the installation process. If malware is preventing the installation of the anti-malware program while in normal mode, Safe Mode can sometimes bypass these restrictions. **a. Quarantine the system.** Since she is experiencing slow performance, failed updates for her antivirus, and suspicious network activity, running an anti-malware program will help her identify and remove any potential malware that may be causing these issues. This step is crucial before considering other actions like quarantining or rolling back the system. **c. Educate the end user.** While documenting the problem and recovering user data are important, educating the end user on safe computing practices can help prevent future infections. It's crucial to inform them about recognizing suspicious emails, avoiding untrusted downloads, and maintaining good security hygiene to keep their system safe moving forward. **a. Botnet.** A botnet refers to a network of compromised computers (or servers) that are controlled by an attacker and used to perform tasks, often without the owners\' knowledge. In this case, Kevin\'s server and other computers being used to perform a DDoS (Distributed Denial of Service) attack indicates they are part of a botnet that is being exploited to overwhelm another website. The DDoS attack itself is the action taken using the botnet. **b. publicly.** WANs often utilize public communication networks, such as the internet, to transmit data over large distances. However, they can also use private networks, but the most common context for WANs involves public networks. **c. Sequence Control** The Frame Control field in the 802.11 data frame provides essential information about the frame type, the subtype, and various flags and parameters that help manage the wireless communication, making it a distinguishing feature of the 802.11 standard. **c. terminal adapter.** A terminal adapter is used to connect digital devices to analog systems, converting the digital signals into a format that can be understood by analog devices like ISDN phones. **c. nonroutable** protocols. Nonroutable protocols, such as certain proprietary protocols, do not function well over WAN links that rely on Layer 3 routing, which is necessary for the communication between different networks. **a. single** direction. Directional antennas are designed to focus the signal in a specific direction, providing a stronger signal along that narrow path compared to a wider spread of signal. a. **Mesh** WANs are the most fault-tolerant type of WAN because they provide multiple routes for data to follow between any two points. **Virtual Circuits** are connections between network nodes that, although based on potentially disparate physical links, logically appear to be direct, dedicated links between those nodes. A(n) **receiving** node in synchronous communications recognizes that it should be receiving data by looking at the time on the clock. A(n) **multiplexer** combines individual SONET signals on the transmitting end, and another multiplexer separates combined signals on the receiving end. A(n) **T-carrier** uses TDM (time division multiplexing) over two wires to divide a single channel into multiple channels. False False True False True **d. Geosynchronous earth orbiting** satellites are the type used by the most popular satellite data service providers. **a. Interference** is a significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves. **a. 802.11a** is the least popular WLAN standard. **c. 802.11n** may use either the 2.4-GHz or 5-GHz frequency range. **c. iwconfig** is a command-line function for viewing and setting wireless interface parameters, and it is common to nearly all versions of Linux and UNIX. **a. Frame aggregation** is an 802.11n network feature allowing the combination of multiple frames into one larger frame. **c. Channel bonding** is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.