Networking quiz 1

What is MAN?

A network of users that share computer resources across a metropolitan area

What is LAN?

A network of users that share computer resources in a limited area

What is WAN?

A network that connects local area networks across a large geographic area

Expand the acronym NIC.

Network Interface Card: The type of network adapter used in desktop computers is called the network interface card

Expand the acronym MAC

Media Access Control: The NIC contains a unique network address called the MAC address. MAC stands for "media access control.

Define the term protocol

The set of rules established for users to exchange information across a network

Define the term deterministic

A deterministic network is where access to the network is provided at fixed time intervals. For example, a Token Ring network is a deterministic network because each station connected to the network is ensured access for transmission of its messages at re

A disadvantage of the Token Ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding which of the following?
a. Router
b. Multipart repeater
c. Token passer
d. Token Ring Hub

D. Token Ring Hub

What is the difference between a hub and a switch?

A Hub is used to interconnect networking devices. A drawback to the hub is that it broadcasts the data it receives to all devices connected to its ports. The hub has been replaced by the network switch in most modern networks. A hub operates at Layer 1. A

Which OSI layer is responsible for adding a header that includes routing information?

Network Layer

Which OSI layer is considered the media access control layer?

Data Link Layer

Which OSI layer combines messages or segments into packets?

Transport Layer

Which OSI layer is responsible for the mechanical connection to the network?

Physical Layer

The OSI layer responsible for data compression and encryption is which layer?

Presentation Layer

TCP functions at what layer of the OSI model?

Transport Layer

HTTP functions at what layer of the OSI model?

Application Layer

IP and IPX are examples of protocols that operate in what layer of the OSI model?

Network Layer

The network interface card operates at what layer of the OSI model?

Physical layer

Why are the layers of the OSI model important to the network administrator?

-To troubleshoot network problems by verifying functionality of each layer.
-In many cases it requires the network administrator to isolate at what layer the network problem occurs.

Define the acronym CSMA/CD and the protocol that uses CSMA/CD.

i. "Carrier Sense Multiple Access with Collision Detection"
ii. The networking protocol "Ethernet".

What information is not included in an Ethernet frame?

Frame Size

What is the minimum size of the data payload in an Ethernet frame?

i. 46 bytes
ii. The data being transmitted, followed by the pad that is used to bring the total number of bytes up to the minimum of 46 if the data field is less than 46 bytes.

What is the minimum and maximum size of an Ethernet frame?

i. Minimum - 64 bytes
ii. Maximum - 1518 bytes

Define the acronym OUI. Where is the OUI used?

i. "Organizationally Unique Identifier"
ii. The first 3 bytes, 24 bits, or 6 digits of a MAC address.

What does the OUI represent?

i. The vendor of the NIC "Network Interface Card

Cite the three advantages of a wired network.

i. Faster network data transfer speeds (within the LAN)
ii. Relatively inexpensive to setup
iii. The network is not susceptible to outside interference.

Cite three advantages of a wireless network.

i. User mobility
ii. Simple installations
iii. No cables

What does it mean for a wireless networking device to be Wi-Fi compliant?

i. That the device has been tested by the Wi-Fi Alliance (Wireless Fidelity) and is certified for compliance with 802.11x wireless standards.

What are the most common types of equipment that are used to establish a broadband connection to the ISP?

i. Cable Modem
ii. DSL Modem

Name six issues that should be considered when planning a home network?

i. Data Speed - "Wired of Wireless?"
ii. Cost - "Cost of equipment?"
iii. Ease of Implementation- "Cables already ran? Wireless setup is usual minimal."
iv. Appearance- "Wireless networks are neater with no cables."
v. Home Access- "Wireless for mobility,

Why is checking the lights of a networking device that connects to the ISP important?

i. Link Verification will typically appear as a Lit Link Light.
ii. The presence of a link light indicates that the transmit and receive pairs are properly aligned and the connected devices are communicating.
iii. Absence of the light indicates a possible

What is the purpose of a Range expander?

i. The wireless signal might not be reaching all the areas that need coverage.
ii. The device relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all.
iii. Range Extender - Device that relays t

What is a hotspot?

A limited geographic area that provides wireless access for the public.

List five steps that can be used to protect the home network.

i. Change the default factory passwords.
ii. Change the default SSID. "Service Set Identifier"
iii. Turn on encryption.
iv. Turn off the SSID broadcast.
v. Enable MAC address filtering.

You have the choice of selecting a networking device with WEP and another with WPA. Which offers better security and why?

a. WPA - Basically put it's an upgrade overlay for WEP.
b. WPA uses Temporal Key Integrity Protocol (TKIP). TKIP is designed to allow WEP to be upgraded. This means that all the main building blocks of WEP are present, but corrective measures have been ad

What is the purpose of the SSID, and what can the network administrator do to protect the network from hackers who might have learned the SSID?

i. The purpose of the SSID is to identify your wireless network and is used by your access point or wireless router to establish an association.
ii. The network administrator can change it periodically and turn off broadcasting it in the device's menu.

What is the purpose of MAC filtering on a wireless network?

Only wireless devices that have specific MAC addresses will be allowed access to the network.

What is a VPN, and how does it protect the data transferred over a wireless network?

i. A VPN is a Virtual Private Network and it establishes a secure network connection and is a way to protect your LAN's data from being observed by outsiders.
ii. A VPN enables a remote or mobile user to access the network as if they were actually physica

How is IP addressing typically handled in a home network?

i. Is managed by the router or wireless router that connects to the ISP.
ii. The ISP will issue an IP address to the router from an available pool of IP addresses manage by the ISP.
i. The computers on the network should then be issued private IP addresse

Which of the following is not a step in building an office LAN?
a. Obtaining proper government permits
b. Configuring the network settings
c. Connecting the devices together
d. Network documentation

a. Obtaining proper government permits

What does RJ-45 represent?
a. A 45-pin connector for CAT6
b. An IEEE standard for data speed
c. An 8-pin modular connector for twisted-pair Ethernet
d. Protocol used to verify a communications link

c. An 8-pin modular connector for twisted-pair Ethernet

What is an uplink port?

Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable.

What is the purpose of an ARP request?

They are used to map an IP address to its MAC address

What is an echo request?

Part of the ICMP protocol that requests a reply from a computer.

What is the purpose of a protocol analyzer?

A protocol analyzer is used to inspect captured data packets.