IT chapter 5 vocabulary, IT Lesson 6, 98-366 Unit 3 Understanding Wired and Wireless Networks (3), Test Bank #4, ITST 1102

List the four steps for a client to get an IP address from a DHCP server.

1. Discover
2. Offering
3. Request
4. Acknowledge

What is the most common cable used today?
UTP
STP
Coaxial
Fiber

UTP
Unshielded twisted-pair (UTP) is the cable most commonly used in local area networks. It's relatively easy to work with, flexible, efficient, and fast.

If you are making a crossover cable and one end is 568A, what should the other end be?
568A
568B
568C
BOGB

568B
Crossover cable is used to connect like devices to each other�for example, a computer to another computer, or a switch to another switch. With the crossover cable, the patch cable is wired with the 568B standard on one side and the 568A standard on t

If you want to connect a computer directly to another computer without using a switch, you use a __________.
straight-through cable
crossover cable
laplink cable
rollover cable

crossover cable
A crossover cable is used to connect like devices to directly each other.

You need to connect a twisted-pair cable to the back of a patch panel. What tool should you use?
punch-down tool
zip tool
wire wedge
oldering iron

punch-down tool
The tools necessary to make the connections between patch panels and RJ45 jacks include a cutting tool, a wire stripper, a punch-down tool, and a continuity tester.

What is the minimum category of twisted-pair cable you need to support 100 Mbps?
Category 3
Category 5
Category 5e
Category 6

Category 5
Twisted-pair cables are categorized according to the frequency at which they transmit signals and their data transfer rate or speed. To support 100 Mbps, you need to use a minimum of category 5. The maximum length is 100 m.

When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem?
EMI
RFI
network adapter failure
cable failure

RFI
Wireless adapters/networks use 2.4 or 5.0 GHz, which is the same frequency that wireless phones use. Therefore, if both operate at the same time, you have radio frequency interference (RFI).

You are setting up a network within a warehouse using Category 6 UTP. However, parts of the network are down because of the heavy machinery used. What cable type should you use?
STP
coaxial
fiber
plenum-rated

fiber
A common type of interference is crosstalk, in which the signal that is transmitted on one copper wire or pair of wires creates an undesired effect on another wire or pair of wires.

What type of cable should be used as part of a fire code for a building?
STP
PVC
heat protected
plenum-rated

plenum-rated
Cables that are installed inside walls or above drop ceilings where they cannot be accessed by sprinkler systems in the case of a fire should be plenum-rated or low-smoke rated. Plenum-rated cables have a Teflon coating that makes them more i

What do you call it when electrical signals jump to another set of wires?
EMI
RFI
crosstalk
jumpitis

crosstalk
A common type of interference is crosstalk, in which the signal that is transmitted on one copper wire or pair of wires creates an undesired effect on another wire or pair of wires.

Which of the following is not a fiber connector?
FC
LC
RJ-45
MT-RJ

RJ-45
Fiber connectors include FC, LC, MT-RJ, SC, and ST. RJ-45 is used for UTP cables.

Which of the following is a characteristic of single-mode fiber?
Single-mode fiber supports longer distances than multimode fiber.
Single-mode fiber has increased bandwidth than multimode fiber.
Single-mode supports only a ring topology.
Single mode allow

Single-mode fiber supports longer distances than multimode fiber.
With single-mode fiber, you send one signal. As a result, the single mode can communicate over multi-mode.

What is the maximum speed supported by 802.11b?
1 Mbps
10 Mbps
11 Mbps
54 Mbps

11 Mbps
:: 802.11b runs at 2.4 GHz and supports up to 11 Mbps.

What is the maximum speed supported by 802.11g?
1 Mbps
10 Mbps
11 Mbps
54 Mbps

54 Mbps
802.11g runs at 2.4 GHz and supports up to 54 Mbp

What command displays the IP address, subnet mask, and default gateway of the system you are currently on?

ipconfig

What protocol does the ping command use to test network connectivity?

ICMP

What command do you use to clear the DNS cache on a local system?

ipconfig /flushdns

What command do you use to test a system's IPv4 protocol stack?

ping 127.0.0.1

What command do you use to display active TCP or UDP connections?

netstat

What command is used to display NetBIOS over TCP/IP statistics?

nbtstat

What command clears the NetBIOS name cache table?

nbtstat -R

What command tests network connectivity while showing you each hop along the way?

tracert

What command tests network connectivity while showing you each hop along the way and the degree of packet loss?

pathping

What command do you use to connect to a FTP server to download a file?

ftp

What command do you use to connect to a remote computer so that you can execute commands?

telnet

What command can you use to connect to a mail server so that you can test SMTP?

telnet

What command do you use to display and modify the network configuration of a local computer?

netsh

What command is used to add static routes to a Windows computer?

route

What command do you use to display the routing table on a local system?

route print

What command do you use to display the MAC address on a system?

ipconfig /all

What command do you use to retrieve or update your DHCP assigned configuration?

ipconfig /renew

What command do you use to register the computer's name and IP address with the nearest DNS server?

ipconfig /registerdns

What command displays Ethernet statistics?

netstat -e

What option do you use to ping constantly until you stop it?

-t

What protocol automatically configures IP configuration for a client?

DHCP

Which of these ports does DHCP use?

67

After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server?

Authorize the server

You have a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem?

It cannot communicate with a DHCP server.

What name does Windows Server 2008 R2 use for Terminal Services?

Remote Desktop Services

What port does Remote Desktop Services use?

3389

What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2?

Microsoft RRAS

What protocol is used with L2TP to encrypt data?

IPSec

Which component of IPSec is generates the encryption and authentication keys?

SA

Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality?

AH

Which IPsec component includes the most security, including confidentiality?

ESP

What port does DNS use?

53

What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses?

WINS

What feature within Windows allows the server to act as a router?

IP forwarding

You use the ____ to connect to a terminal server.

RDC (Remote Desktop Connection)

____ provides name resolution between domain names and IP addresses.

DNS

____ allows a user to connect to a corporate network using the Internet

VPN

What command do you use to release the IP configuration handed out by a DHCP server?

Ipconfig/release

What command do you use to reacquire IP configuration from a DHCP server?

Ipconfig/renew

What of the following is not a characteristic of 802.11n?
frame aggregation
channel bonding
RFI protection
MIMO

RFI protection
802.11n is superior to older WLAN standards in the following ways: Multiple-Input Multiple-Output (MIMO), frame aggregation, and channel bonding.

Which is the most secure encryption used in wireless networks?
WEP
WPA
WPA2
802.1x

WPA2
Several types of encryption are available for wireless networks, but the most secure is WPA2 when used with AES.

What is used to identify a wireless network?
network ID
frequency identifier
wireless password
SSID

SSID
When utilizing infrastructure mode, the base unit (normally a WAP) will be configured with a service set identifier (SSI. This then becomes the name of the wireless network and it is broadcast over the airwaves. Thus, when clients want to connect to

To test a cable, you would use a _____________.

continuity tester
To make the connections between patch panels and RJ45 jacks you need a cutting tool, a wire stripper, a punch-down tool, and a testing device known as a continuity tester, which tests all connection pins one by one.

For organizations, using ___________ authentication for wireless networks is recommended.

802.1X
One way to secure a wireless connection is to use IEEE 802.1X,a port-based network access control (PNA. This provides strong authentication to devices that need to connect to the WLAN; it can also be used for regular wired LANs.

When a signal degrades as it runs through a wire, you have ________.

attenuation
Generally, you can run twisted-pair cables 100 meters before the signal degrades to such a point that it cannot be interpreted by the destination host. This is known as attenuation. If a cable needs to be run farther, you can use a signal repe

What mode uses a wireless access point?

infrastructure mode
Infrastructure mode occurs when wireless clients connect to and are authenticated by a wireless access point, which can be expanded by creating a wireless distribution system�a group of WAPs interconnected wirelessly.

What is the default subnet mask for a Class B network?

255.255.0.0

You have a host with the address of 180.24.45.120. To what class would this be address be assigned?

Class B

For IPv4, what class is used for multicasting?

Class D

What is the maximum number of hosts you can use for each subnet that belongs to a class C address?

254

What type of address is 202.23.2.255?

broadcast address

What type of address is used to send a single set of packets to multiple hosts?

multicast address

Which of the following is not a private address?

200.23.34.120

What type of address is 169.254.32.23?

APIPA

You have a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of 169.32.54.2. What is the problem?

The host cannot find a DHCP server.

What defines the nearest router for a host?

default gateway

What server is used to translate host names to IP addresses?

DNS

What is used to remap private addresses to public addresses and back?

NAT

What do you call a smaller network that is part of a larger network?

subnet

You have a subnet mask of 255.255.240.0. What would the CIDR notation be?

/20

How many bits is an IPv6 address?

128

What type of address is 2001:4212:0000:34DB:0000:0000:0000:4231?

IPv6

A __________ address is assigned by a DHCP server.

dynamic

What is the loopback IP address?

127.0.0.1

What IPv6 address incorporates IPv4?

IPv4-mapped addresses

You are in charge of installing 200 twisted-pair cable drops. What wiring standard
should you most likely use?
a. 568A
b. BOGB
c. 568B
d. 586B

Answer: C, 568B

Your boss wants you to connect two of his laptops directly to each other using their
network adapters. What kind of cable should you use?
a. Rolled cable
b. Crossover cable
c. Straight through cable
d. Patch cable

Answer: B, Crossover cable

You are making a specialized wired connection for a server that will operate on an
Ethernet network. Which two wiring colors should you use?
a. Orange and green
b. Orange and blue
c. Orange and brown
d. White and blue

Answer: A, Orange and green

One of the network connections to a programmer's computer has failed. You suspect it
involves a problem with the twisted-pair cable. What tool should you use to test for any
problems in the cable?
a. Patch tester
b. Wireshark
c. Continuity tester
d. Fox a

Answer: C, Continuity tester

The IT director has asked you to connect three new super computers to the backbone of
a network that runs at 1 Gbps. The pressure is on! What type of cable will be sufficient
for this task?
a. Category 3
b. Category 5
c. Category 5e
d. Category 10a

Answer: C, Category 5e

Your network contains many fiber optic connections. Which one of the following does
not belong in your fiber network?
a. FC connector
b. ST connector
c. TOSLINK
d. 8P8C

Answer: D, 8P8C

You need to connect 802.11a, 802.11b, and 802.11n wireless networks together. What
wireless tool will guarantee you connectivity between these networks?
a. Wireless network adapter
b. Wireless hub
c. Wireless router
d. Wireless bridge

Answer: D, Wireless bridge

Your boss has asked you to connect three new laptops to the wireless network
"WLAN42." It runs at a speed of 54 Mbps only and a frequency of 2.4 GHz only. What
IEEE 802.11 standard should you implement when connecting the laptops to the WAP?
a. 802.11a
b.

Answer: C, 802.11g

You need to connect a desktop computer to a WLAN using the strongest encryption
type possible. Of the following choices, which is the strongest?
a. WEP
b. RADIUS
c. WPA2
d. WPA

Answer: C, WPA2

You have connected thirteen PCs and laptops to a wireless network. To make your
WLAN more secure, what should you do to disallow additional client access to the WAP?
a. Enable channel bonding
b. Enable frame aggregation
c. Disable SSID broadcasting
d. Dis

Answer C, Disable SSID broadcasting

The manager of IT asks you to connect a computer to an RJ45 jack. You should use a
____________ cable to do so.

Answer: Straight Through

A twisted-pair cable was run 140 meters without any repeaters. Now, the signal cannot
be picked up by the destination host. This cable is the victim of ____________.

Answer: Attenuation

Your network uses category 3 cabling, but it needs to be upgraded so that it can support
faster 100 Mbps applications. In this situation, ____________ would be the minimum
cable needed to accomplish this.

Answer: Category 5

The type of cable known as ____________ cable will protect the copper wires inside the
cable from EMI.

Answer: Shielded Twisted Pair

Your boss complains about hearing a background conversation when he is talking on the
phone. This is an example of ____________.

Answer: Crosstalk

You need to connect LANs in two buildings in a campus area network. The buildings are
several kilometers apart. You would need ____________ fiber optic cable to accomplish this.

Answer: Single-Mode

Your boss doesn't know exactly how to do it, but he knows that he wants port-based
authentication for his network. He is searching for a ____________ implementation.

Answer: 802.1x

In order to connect to WLANs that are faster than 54 Gbps, you would need to utilize
the IEEE ____________ standard.

Answer: 802.11n

The ____________ wireless encryption mode can be as strong as 256-bit.

Answer: WPA2

A ____________ is when two or more wireless clients communicate directly with each
other, without the need for a WAP.

Answer: Ad-hoc Network

Which of the following regenerates a signal and broadcasts that signal to every computer
connected to it?
a. Hub
b. Switch
c. Router
d. Firewall

Answer: A, Hub

Which of the following is not a central connecting device?
a. Hub
b. Switch
c. SOHO router
d. Windows 7 client

Answer: D, Windows 7 Client

You need to install a network adapter to a computer so that it can be connected to a network
that uses twisted-pair cabling. What type of port does the network adapter need to use?
a. RJ11
b. RJ45
c. RG-58
d. Fiber optic

Answer: B, RJ45

Where can you go in Windows 7 to access the Properties of a network adapter?
a. Device Manager
b. Ping
c. Advanced Firewall
d. Task Manager

Answer: A, Device Manager

You need to connect a computer's network adapter to a switch. You want the connection
to be able to send and receive data simultaneously. What type of connection do you need?
a. Half duplex
b. Full duplex
c. Simplex
d. 100 Mbps

Answer: B, Full Duplex

You need to connect a computer at a rate of 100,000,000 bits per second. What speed
network adapter should you install?
a. 10 Mbps
b. 100 MB/s
c. 100 Mbps
d. 1000 Mbps

Answer: C, 100 Mbps

You need to connect to a router that has the IP address 192.168.1.100 on a standard,
default Class C network using the subnet mask 255.255.255.0. Which of the following
is a valid IP address for your network adapter?
a. 192.168.0.1
b. 192.168.1.1
c. 192.1

Answer: B, 192.168.1.1

You have just installed a network adapter and configured an IP address and subnet
mask. What command can you use to verify that the IP address is configured and listed
properly?
a. Ping
b. Tracert
c. CMD
d. Ipconfig

Answer: D, Ipconfig

You need to ping your own computer to see if it is alive. Which of the following would
qualify as command-line syntax to do so?
a. Ping localclient
b. Ping 128.0.0.1
c. Ping loopback
d. Ping network adapter

Answer: C, Ping loopback

You have been instructed to connect a computer to a group of hosts that have been
segmented from the regular network. What kind of network is this?
a. LAN
b. WLAN
c. WAN
d. VLAN

Answer: D, VLAN

The manager of IT asks you to connect a perimeter network to the firewall, which will
be separate from the LAN. This type of network is known as a ______________.

Answer: DMZ

A ______________ topology can be defined by connecting several hubs to a switch.

Answer: Star

802.3u Ethernet networks run at ____________ Mbps.

Answer: 100 Mbps

A ____________ is a program used to download files quickly from a P2P network.

Answer: BitTorrent Client

The ______________ network architecture is physically a star and logically a ring.

Answer: Token Ring

802.3ab Ethernet networks run at ____________ Mbps.

Answer: 1000 Mbps

A ___________ connection is one in which data can be both sent and received, but not
at the same time.

Answer: Half Duplex

A ______________ topology can be defined as connecting several computers together
in a circle without the use of a hub or a switch.

Answer: Ring

When several computers are connected in a small geographic area, it is known
as a ____________.

Answer: LAN (Local Area Network)

A _______________ acts as a central connecting device and allows laptops, PDAs, and
handheld computers to communicate with each other.

WAP (Wireless Access Point)

Local Area Network

a group of computers confined to a small geographic area, usually one building.

Network documentation

any information that helps describe, define, and otherwise explain how computers are connected in a physical and logical way.

Hub

connects each of the networked computers, known as hosts, to one another by way of copper-based cables.

Broadcast

the data is sent to every host on the network.

Server

used to centralize data and share it with other computers on the network.

Network Adapter/Network Interface Card (NIC)

device that enables you to send and receive data to and from your computer.

Serial Data Transfer

the transfer of one bit at a time or transfer in a single bit stream.

Ethernet

a set of rules that govern the transmission of data between network adapters and various central connecting devices.

Unicast

describes the situation in which information is sent to one host only.

Data Transfer Rate

network speed or bit rate/the maximum bits per second that can be transmitted over a network.

IP Address

defines the computer you are working on/the computer you are working on's logical address.

Subnet Mask

a group of four numbers that define what IP network the computer is a member of.

Wireless Access Point (WAP)

acts as the central connecting device for the network.

Virtual Lan/VLAN

a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.

Perimeter Network/Demilitarized Zone

a small network that is set up separately from a company's private LAN and the Internet.

Network Topology

the physical connections of hosts in a computer network.

Star Topology

When this topology is used, each computer is individually wired to a central connecting device with twisted-pair cabling.

Mesh Topology

every computer connects to every other computer; no central connecting device is needed.

Distributive Computing

Used for both client-server and peer to peer networks and means that every device or workstation has its own processing power.

Client Server

an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7.

Peer-to-peer Networking

each computer is treated as an equal and means each computer has an equal ability to serve data and to access data, just like any other computer on the network.

Sharing, Communication, Organization, and Money

The real reasons that organizations need networks.

8P8C

What is an RJ45 port where the RJ45 plug at the end of the network cable connects, otherwise known as?

Full Duplex

means that the network card can send and receive data simultaneously.

Half Duplex

Means that the network adapter will send and receive data but not at the same time.

Transceive

A full duplex connection can _________ twice as much information per second as a half duplex connection.

RJ45

You need to install a network adapter to a computer so that it can be connected to a network that uses twisted-pair cabling. What type of port does the network adapter need to use?

Device Manager

Where can you go in Windows 7 to access the Properties of a network adapter?

Full Duplex

You need to connect a computer's network adapter to a switch. You want the connection to be able to send and receive data simultaneously. What type of connection do you need?

100 Mbps

You need to connect a computer at a rate of 100,000,000 bits per second. What speed network adapter should you install?

Ipconfig

You have just installed a network adapter and configured an IP address and subnet mask. What command can you use to verify that the IP address is configured and listed properly?

Ping loopback

You need to ping your own computer to see if it is alive. Which of the following would qualify as command-line syntax to do so?

VLAN

You have been instructed to connect a computer to a group of hosts that have been segmented from the regular network. What kind of network is this?

Demilitarized Zone

The manager of IT asks you to connect a perimeter network to the firewall, which will be separate from the LAN This type of network is known as ______________.

Star Topology

A ____________ topology can be defined by connecting several hubs to a switch.

100 Mbps

802.3u Ethernet networks run at __________ Mbps.

Torrent

A ___________ is a program used to download files quickly from a P2P network.

Token Ring

The __________ network architecture is physically a star and logically a ring.

1Gbps / 1000 Mbps

802.3ab Ethernet networks run at __________ Mbps.

Ring

A ___________ topology can be defined as connecting several computers in a circle without the use of a hub or a switch.

LAN

When several computers are connected in a small geographic area, it is known as a __________.

802.3

These Ethernet networks run at 10Mbps and have a cable standard of 10Base5 that is Thick coaxial cable.

802.3a

These Ethernet networks run at 10 Mbps and have a cable standard of 10Base2 that is Thin coaxial cable.

802.3i

These Ethernet networks run at 10 Mbps and have a cable standard of 10Base-T that is Twisted pair cable.

802.3j

These Ethernet networks run at 10 Mbps and have a cable standard of 10Base-F that is Fiber optic cable.

802.3z

These Ethernet networks run at 1 Gbps / 1000 Mbps and have a cable standard of 1000Base-X that is Fiber optic cable.

802.3ae

These Ethernet networks run at 10 Gbps and have a cable standard of 10Gbase-SR, 10GBase-LR, 10GBase-ER and so on that is Fiber optic cable.

802.3an

These Ethernet networks run at 10 Gbps and have a cable standard of 10 GBase-T that is Twisted pair cable.

Network Documentation

You have a key network administrator leave a company. Therefore, what does the company depend on to continue to use the network?

Switch

What is the most common central device used today to connect computers to a network?

RJ45

What is the most common adapter or connector used to connect a computer to a wired network?

Full Duplex

Which of the following does a switch use for increased performance?

VLAN

What do you use to isolate a group of computers within your organization?

Switch

What do you use to create VLANs?

Demilitarized Zone (DMZ)

What zone is used to publish external websites for an organization?

Mesh

Which topology is the most redundant and the most expensive?

802.3

What standard describes CSMA/CD?

CSMA/CA

What mechanism do wireless networks use to access the network?

Distributive Computing

What model promises the most processing power?

Client/Server

Which model uses a central database for authentication?

Network Controller

What type of server does Active Director run on?

Peer-To-Peer

Which model does each host have their own security database?

Unicast

What type of communication is sent to a single designated host?

IP address

What is used to uniquely identify a host on a TCP/IP network?

Host

A ___________ is a single computer or device that connects to a TCP/IP network?

Wireless Access Point

What is the central device used in wireless LANs?

Ping

What command do you use to test the TCP/IP stack on a computer?

Your client requires that you install 284 computers on a single
IP network. Which of the following IP classes would be your best option?
a. Class A
b. Class B
c. Class C
d. Class D

B. Class B

Your boss wants you to set up three computers on a classful
network with a default subnet mask of 255.0.0.0. What class does he want the
computers to be set up on?
a. Class A
b. Class B
c. Class C
d. Class D

A. Class A

Proseware, Inc., needs you to set up 100 computers on a private
Class A network. Which of the following IP network numbers meet all of the
criteria for a private Class A network?
a. 100.10.1.0
b. 192.168.1.0
c. 172.16.0.0
d. 10.0.0.0

D. 10.0.0.0

You need to subnet a 192.168.1.0 network. You decide to use the
255.255.255.240 subnet mask. What is 240 equal to in binary?
a. 11100000
b. 11000000
c. 11110000
d. 10000000

c. 11110000

The IT director has asked you to set up 14 separate IP networks
that can each have up to 400 computers. What IANA private IP range should you
select?
a. 10.0.0.0-10.255.255.255
b. 172.16.0.0-172.31.255.255
c. 192.168.0.0-192.168.255.255
d. 169.254.0.0-169

b. 172.16.0.0-172.31.255.255

You need to connect 802.11a, 802.11b, and 802.11n wireless
networks together. What wireless tool will guarantee connectivity between these
networks?
a. Wireless network adapter
b. Wireless hub
c. Wireless router
d. Wireless bridge

d. Wireless bridge

Your boss's computer cannot connect to the Internet. Examine the
following ipconfig results and select the best answer explaining why this has occurred.
IPv4 Address. . . . . . . . . . . : 10.254.254.1
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Def

c. The default gateway is incorrect.

You have installed a device that has two IP addresses. One
address, 64.51.216.27, is displayed to the Internet. The other address,
192.168.50.254, communicates with the LAN. What type of technology have you
implemented?
a. Subnetting
b. IPv6
c. Network ad

c. Network address translation

The manager of IT asks you to subnet a group of computers on the
192.168.50.0/28 network. This will provide you with _________ number of
subnets.

16

Your network uses the subnetted IP network 192.168.100.0/26. Its
subnet mask is _________.

255.255.255.192

You are troubleshooting an IP network with the following number:
10.254.254.0/24. This type of IP network number is known as _________.

Classless Inter-Domain
Routing

Your boss worries about how many IPv4 addresses are left and
inquires about installing IPv6. Whereas IPv4 is a 32-bit system, IPv6 is a
_________-bit system.

128

A client wants you to set up a group of IPv6 network interfaces
in such a way that each of them will have all packets delivered to them. Here,
you should implement a _________ address.

multicast

You are troubleshooting a server that needs to connect directly
to the Internet. After you run an ipconfig/all, you see that the server has
been auto-assigned the IPv6 address fe80::260:8ff:fec0:98d%4. The server won't
connect to the Internet due to the f

link-local

To save time when working with IPv6 addresses in the command
line, you like to truncate them. The truncated version of
2001:4860:0000:2001:0000:0000:0000:0068 would be _________.

2001:4860:0:2001::68

You see an IPv6 address displayed as fe80::5efe:10.0.0.2%2. This
is an example of _________.

IPv6 tunneling

You are troubleshooting a client's network. The client is using
the following IP network scheme: IP network: 192.168.50.0 Subnet mask:
255.255.255.240 The client has 196 computers that are functioning properly, but
another 30 computers will not connect to

they have run out of
addresses

You are troubleshooting a network connectivity problem and see
the command results listed here. What command was typed to acquire these
results? Request timed out. Request timed out. Request timed out. Request timed
out.Packets: Sent = 4, Received = 0, Lo

c. ping

You are told to determine the MAC address of a Windows computer.
Which command should you use to find this information?
a. ipconfig
b. ipconfig /all
c. ipconfig /release
d. ipconfig /flushdns

b. ipconfig /all

The IT director has asked you to ping a computer continuously.
Which of the following is the best command to use?
a. ping -n
b. ping -t
c. ping -l
d. ping 127.0.0.1

b. ping -t

You are troubleshooting a computer that cannot obtain the proper
IP address from a DHCP server. Of the following commands, which should you try
first?
a. ipconfig /release
b. ipconfig /renew
c. ipconfig /displaydns
d. ipconfig /source=dhcp

a. ipconfig /release

What type of communication is sent to a single designated host?

unicast

What mechanism do wireless networks use to access the network?

CSMA/CA

What model promises the most processing power?

distributive computing

What is the central device used in wireless LANs?

WAP wireless access point

What command do you use to test the TCP/IP stack on a computer?

ping localhost (or ping 127.0.0.1 or ping loopback)

What is used to uniquely identify a host on a TCP/IP network?

IP address

What is the most common central device used today to connect computers to a network?

switch

You have a key network administrator leave a company. Therefore, what does the company depend on to continue to use the network?

network documentation

Which of the following does a switch use for increased performance?

full duplex

Which topology is the most redundant and the most expensive?

mesh

What do you use to isolate a group of computers within your organization?

VLAN

What is the difference between a switch and a hub?

A hub allows only one device to communicate to another device at a time.

Which model users a central database for authentication?

client/server

Which model has each host have their own security database?

peer-to-peer

A __ is the most basic of central connecting devices; it connects each of the networked computers

hub

Any host that sends data must first send that data to the hub, where it is amplified and ___ to the rest of the network

broadcast

A __, is also known as a NIC

network adapter

The ___ is the cornerstone of networking becuase it defines the computer or host you are working on

IP address

A ___ is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location

VLAN

A _________ is a single computer or device that connects to a TCP/IP network

host

What zone is used to publish external websites for an organization?

DMZ

What standard describes CSMA/CD?

802.3

What is the most common adapter or connector used to connect a computer to a wired network?

RJ45

What type of server does Active Director run on?

network controller

What do you use to create VLANs

switch

Which protocol is used to translate IP addresses to MAC addresses?

ARP

Which layer in the OSI model covers routing between networks?

Network

What ports are defined above 49,152?

dynamic ports

What model is used to describe how data communication occurs between hosts

OSI reference model

Which layer of the OSI model is used to create a connection so that a host can transfer files?

Session

What layer in the OSI model is used to encrypt data?

Presentation

Which layer in the OSI model do MAC addresses and switches use?

Data Link

A layer 3 switch is similar to a __________.

router

Which layer in the OSI model includes the cable and network adapters?

Physical

Which layer in the OSI model covers HTTP, FTP, and RDC?

Application

Which protocol do you use as the transport protocol for a video application?

UDP

TCP/IP and IPX/SPX are known as _________ stacks

protocol

Which layer in the OSI model is included in the TCP/IP model?

Transport

Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?

well-known ports

What layer in the OSI model is responsible for logging on and off?

Session

What are the seven layers found in the OSI model, in order?

Physical, Data Link, Network, Transport, Session, Presentation, Application

How many layers does the TCP/IP model have?

4

Which layer in the OSI model is used to verify that data was delivered without error?

Data Link

What mode uses a wireless access point?

infrastructure mode

What is used to identify a wireless network?

SSID

Which of the following is a characteristic of single-mode fiber?

Single-mode fiber supports longer distances than multimode fiber.

What is the maximum speed supported by 802.11b?

11 Mbps

What is the maximum speed supported by 802.11g?

54 Mbps

If you want to connect a computer directly to another computer without using a switch, you use a __________

crossover cable

What of the following is not a characteristic of 802.11n?

RFI protection

You are setting up a network within a warehouse using Category 6 UTP. However, parts of the network are down because of the heavy machinery used. What cable type should you use?

fiber

You need to connect a twisted-pair cable to the back of a patch panel. What tool should you use?

punch-down tool

ad-hoc mode

also referred to as peer-to-peer, used more often in a handheld computer environment

frame aggregation

The sending of two or more frames of data in a single transmisssion

Continuity Tester

Test all the pins of the connection one by one

Interference

Can be a real problem with twisted-pair networks or any networks

Single Mode Optic

This type of cable is normally used for longer distance runs

What do you call it when electrical signals jump to another set of wires?

crosstalk

What is the minimum category of twisted-pair cable you need to support 100 Mbps?

Category 5

When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem?

RFI

What is the most common cable used today?

UTP

For organizations, using ___________ authentication for wireless networks is recommended.

802.1X

If you are making a crossover cable and one end is 568A, what should the other end be?

568B

Which of the following is not a fiber connector?

RJ-45

What type of cable should be used as part of a fire code for a building?

plenum-rated

To test a cable, you would use a _____________.

continuity tester

When a signal degrades as it runs through a wire, you have ________.

attenuation

Which is the most secure encryption used in wireless networks?

WPA2

What command do you use to display active TCP or UDP connections?

netstat

What command do you use to connect to a remote computer so that you can execute commands?

telnet

What command displays the IP address, subnet mask, and default gateway of the system you are currently on?

ipconfig

What command is used to add static routes to a Windows computer?

netstat -e

What command do you use to display the MAC address on a system?

ipconfig /all

What command tests network connectivity while showing you each hop along the way?

tracert

Elevated Mode

Running command prompt as an Administrator

Net Command

Not really considered part of the TCP/IP command set, it can display all kinds of important networking data

OSPF

Link-sate protocol that monitors the network for routers that have a change in their link-state

tracert

Shows paths to remote destinations, extending beyond one or more routers

UNC

Universal Naming Convention

What command do you use to display the routing table on a local system?

route print

What command do you use to clear the DNS cache on a local system?

ipconfig /flushdns

What command do you use to test a system's IPv4 protocol stack?

ping 127.0.0.1

What option do you use to ping constantly until you stop it?

nbtstat

What command can you use to connect to a mail server so that you can test SMTP?

telnet

What command do you use to retrieve or update your DHCP assigned configuration?

ipconfig /renew

What command clears the NetBIOS name cache table?

nbtstat -R

What command do you use to register the computer's name and IP address with the nearest DNS server?

ipconfig /registerdns

What command tests network connectivity while showing you each hop along the way and the degree of packet loss?

pathping

What command do you use to connect to a FTP server to download a file?

ftp

What command do you use to display and modify the network configuration of a local computer?

netsh

What protocol does the ping command use to test network connectivity?

ICMP

What name does Windows Server 2008 R2 use for Terminal Services?

Remote Desktop Services

Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality?

AH

Which component of IPSec is generates the encryption and authentication keys?

SA

Which of these ports does DHCP use?

67

What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses?

WINS

_________ provides name resolution between domain names and IP addresses.

DNS

You have a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem?

It cannot communicate with a DHCP server.

________ allows a user to connect to a corporate network using the Internet.

VPN

What command do you use to release the IP configuration handed out by a DHCP server?

ipconfig /release

You use the ________ to connect to a terminal server.

Remote Desktop Connection (RDC)

What command do you use to reacquire IP configuration from a DHCP server?

ipconfig /renew

What protocol automatically configures IP configuration for a client?

DHCP

After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server?

Authorize the server

What port does Remote Desktop Services use?

3389

Which IPsec component includes the most security, including confidentiality?

ESP

What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2?

Microsoft RRAS

What protocol is used with L2TP to encrypt data?

IPSec

What port does DNS use?

53

What feature within Windows allows the server to act as a router?

IP forwarding

List the four steps for a client to get an IP address from a DHCP server.

Discover, Offering, Request, and Acknowledge

How many B channels does an ISDN PRI support?

23

_________ uses a clocking circuit to control the timing of communications between two WAN devices such as routers.

Static route

What technology uses wires from the telephone company to provide broadband Internet connection?

DSL

When you have multiple circuits connected to a site, the entire circuit is known as a ___________.

virtual circuit

What does X.25 use as its DTE device?

PAD

What is the primary disadvantage of X.25?

slow speeds

When a packet traverses a network, each router is a _____.

hop

At what speed does a T3 line run?

44.7 Mbps

What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network?

RIP

What device acts as a high-speed modem for a LAN?

CSU/DSU

_________ is a route that must be manually defined on each router.

Static route

How fast is a DS0 circuit?

64 Kbps

X.25 and Frame Relay are examples of what type of WAN technology?

packet switching

What replaced X.25?

Frame Relay

_________ is used to send packets from one network to another network.

Routing

What part of the network is the point where the responsibility of the administrator ends and the telecommunications provider's responsibility begins?

PAD interface

What technology takes data and breaks them into packets and sends them over a network, sometimes using different routes for each packet?

packet switching

What speed does a T1 run at?

1.544 Mbps

What topology does FDDI use?

ring

What speed does FDDI use?

100 Mbps

In Europe, what circuit would be similar to the T1 found in the United States?

E1

A ________ is the guaranteed certain amount of information provided by a circuit or line.

CIR

What routing protocol is the most popular link-state protocol used within a large organization?

OSPF

What type of device is used to detect malicious network activities and reports only those issues to the administrator?

NIDS

What stage is the World Wide Web in?

2.0

When trying to protect your network, you should create your secure network based on _______.

layers

What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts without further checking?

Internet content filter

Which VPN technology is the most common and the easiest to set up?

PPTP

What protocol is used with L2TP to provide encryption?

IPSec

What type of device is designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity?

NIPS

What port does L2TP use?

1701

What technology can you use temporarily to connect networks from two different companies?

VPN

What type of network can you set up that is another company's internal network?

extranet

What acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future?

proxy server

Which type of firewall blocks packets based on rules that are based on IP addresses or ports?

packet filtering

An _________ is the internal network for an organization.

intranet

What type of configuration creates a DMZ between two firewalls?

back-to-back configuration

What device is used to protect one network from another by using filtering packets?

firewall

What technology used in firewalls keeps tracks of conversations so that it knows what to allow back into a network?

stateful packet inspection

What port does PPTP use?

1723

The ____________ is the largest WAN in the world.

Internet

What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network?
a) RIP
b) OSPF
c) BGP
d) IGMP

RIP

What routing protocol is the most popular link-state protocol used within a large organization?
a) RIP
b) OSPF
c) BGP
d) IGMP

OSPF

What technology takes data and breaks them into packets and sends them over a network, sometimes using different routes for each packet?
a) circuit switching
b) connection switching
c) packet switching
d) network switching

packet switching

X.25 and Frame Relay are examples of what type of WAN technology?
a) circuit switching
b) connection switching
c) packet switching
d) network switching

packet switching

What device acts as a high-speed modem for a LAN?
a) analog modem
b) telco incoming router
c) packet switcher
d) CSU/DSU

CSU/DSU

What does X.25 use as its DTE device?
a) telco incoming router
b) packet switcher
c) analog modem
d) PAD

PAD

What part of the network is the point where the responsibility of the administrator ends and the telecommunications provider's responsibility begins?
a) last mile
b) demarc
c) router array
d) PAD interface

PAD interface

What is the primary disadvantage of X.25?
a) digital circuit
b) small data payloads
c) circuit switching
d) slow speeds

slow speeds

When a packet traverses a network, each router is a _____.
a) jump point
b) CSU/DSU
c) jump switch
d) hop

hop

When you have multiple circuits connected to a site, the entire circuit is known as a ___________.
a) virtual circuit
b) emulated circuit
c) joined circuit
d) multitasked circuit

virtual circuit

What replaced X.25?
a) Frame Relay
b) ATM
c) ISDN BRI
d) DSL

Frame Relay

At what speed does a T3 line run?
a) 1.5 Mbps
b) 4.5 Mbps
c) 44.7 Mbps
d) 128 Mbps

44.7 Mbps

In Europe, what circuit would be similar to the T1 found in the United States?
a) E1
b) J1
c) T2
d) F1

E1

How many B channels does an ISDN PRI support?
a) 2
b) 8
c) 23
d) 48

23

What speed does FDDI use?
a) 10 Mbps
b) 44 Mbps
c) 54 Mbps
d) 100 Mbps

100 Mbps

What topology does FDDI use?
a) bus
b) star
c) ring
d) mesh

ring

What technology uses wires from the telephone company to provide broadband Internet connection?
a) cable
b) DSL
c) FDDI
d) Frame Relay

DSL

_________ is used to send packets from one network to another network.

Routing

_________ is a route that must be manually defined on each router.

Static route

_________ uses a clocking circuit to control the timing of communications between two WAN devices such as routers.

Static route

A ________ is the guaranteed certain amount of information provided by a circuit or line.

CIR

What speed does a T1 run at?

1.544 Mbps

How fast is a DS0 circuit?

64 Kbps

What protocol automatically configures IP configuration for a client?

DHCP

Which of these ports does DHCP use?

67

After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server?

Authorize the server

You have a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem?

It cannot communicate with a DHCP server.

What name does Windows Server 2008 R2 use for Terminal Services?

Remote Desktop Services

What port does Remote Desktop Services use?

3389

What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2?

Microsoft RRAS

What protocol is used with L2TP to encrypt data?

IPSec

Which component of IPSec is generates the encryption and authentication keys?

SA

Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality?

AH

Which IPsec component includes the most security, including confidentiality?

ESP

What port does DNS use?

53

What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses?

WINS

What feature within Windows allows the server to act as a router?

IP forwarding

You use the ____ to connect to a terminal server.

RDC (Remote Desktop Connection)

____ provides name resolution between domain names and IP addresses.

DNS

____ allows a user to connect to a corporate network using the Internet

VPN

What command do you use to release the IP configuration handed out by a DHCP server?

Ipconfig/release

What command do you use to reacquire IP configuration from a DHCP server?

Ipconfig/renew

List the four steps for a client to get an IP address from a DHCP server.

1. Discover
2. Offering
3. Request
4. Acknowledge

What type of network can you set up that is another company's internal network?
intranet
extranet
internet
DMZ

Extranet

What technology can you use temporarily to connect networks from two different companies?
VPN
HTTP
DHCP
passive router

VPN

Which VPN technology is the most common and the easiest to set up?
PPTP
L2TP with IPSec
SSTP
CHAP

PPTP

What port does L2TP use?
501
1723
1701
443

1723

Which type of firewall blocks packets based on rules that are based on IP addresses or ports?
packet filtering
stateful packet inspection
NAT filtering
Application-level gateway

packet filtering

What technology used in firewalls keeps tracks of conversations so that it knows what to allow back into a network?
stateless packet inspection
stateful packet inspection
NAT filtering
application-level gateway

stateful packet inspection

What acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future?
NAT server
stateful packet inspector
proxy server
NIDS

Proxy server

What type of device is used to detect malicious network activities and reports only those issues to the administrator?
NIDS
NIPS
Internet content filter
NAT server

NIDS

What type of device is designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity?
NIDS
NIPS
Internet content filter
NAT server

NIPS

10. Which DMZ configuration uses one firewall with three interfaces?
back-to-back configuration
three-leg perimeter configuration
basic configuration
perimeter configuration

Three-leg perimeter configuration

What stage is the World Wide Web in?
1.0
1.1
2.0
3.0

2.0

What protocol is used with L2TP to provide encryption?
IPSec
MPPE
HTTPS
MSC-CHAP

IPsec

What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts without further checking?
proxy server
application firewall
NAT filtering
circuit-level gateway

circuit-level gateway

What type of firewall do you use to block access to certain websites or instant messengers?
Internet content filter
NIDS
circuit-level gateway
NAT filtering

Internet content filter

15. When trying to protect your network, you should create your secure network based on _______.
multiple content filters
a master firewall that all traffic flows through
a NAT firewall and a proxy server
layers

layers

The ____________ is the largest WAN in the world.

Internet

An _________ is the internal network for an organization.

Intranet

What port does PPTP use?

1723

What device is used to protect one network from another by using filtering packets?

firewall

What type of configuration creates a DMZ between two firewalls?

back-to-back configuration