Term
|
Definition
A number that uniquely identifies each workstation and device on a network. Without unique addresses, computers on the network could not reliably communicate. |
|
|
Term
|
Definition
The part of a network to which segments and significant shared devices (such as routers, switches, and servers) connect. a.k.a. a network of networks because of its role in interconnecting smaller parts of a LAN or WAN |
|
|
Term
|
Definition
A computer on the network that requests resources or services from another computer on a network. In some cases, a client could also act as a server. |
|
|
Term
|
Definition
the use of data networks to carry voice (or telephone), video, and other communications services in addition to data. |
|
|
Term
|
Definition
A descrete unit of information sent from one node on a network to another |
|
|
Term
|
Definition
a specialized server that enables clients to share applications and data across the network |
|
|
Term
|
Definition
A computer that enables resource sharing by other computers on the same network. |
|
|
Term
|
Definition
the process of distributing data transfer activity evenly across a network so that no single device is overwhelmed |
|
|
Term
|
Definition
a server that manages the storage and transfer of e-mail messages |
|
|
Term
|
Definition
the network services that manage the storage and transfer of e-mail between users on a network. |
|
|
Term
|
Definition
a group of computers and other devices (such as printers) that are connected by and can exchange data via some type of transmission media, such as a cabe, a wire, or the atmosphere |
|
|
Term
|
Definition
a computer or other device connected to a network, which has a unique address and is capable of sending or receiving data. |
|
|
Term
|
Definition
a network in which every computer can communicate directly with every other computer. |
|
|
Term
|
Definition
a standard method or format for communication between network devices |
|
|
Term
|
Definition
a server that runs communications services that enable remote users to log on to a network. aka access server |
|
|
Term
|
Definition
devices, data, and data storage space provided by a computer, whether stand-alone or shared |
|
|
Term
|
Definition
the process of retrieving files from a backup. it is necessary to restore files if the original files are lost or deleted |
|
|
Term
|
Definition
the property of a network that allows you to add nodes or increase its size easily |
|
|
Term
|
Definition
a part of a network that manages share resources. |
|
|
Term
|
Definition
the process of determining how much data transfer activity is taking place on a network or network segment and notifying administrators when a segment becomes overloaded |
|
|
Term
|
Definition
the centralized management of multiple types of network-based commmunications, such as voice, video, fac, and messaging services |
|
|
Term
|
Definition
a computer that runs a desktop operating system and connects to a network |
|
|
Term
CH 2- Which of the following standards organizations has established guidelines for installing network cables in commercial buildings?
Read more: http://wiki.answers.com/Q/Which_of_the_following_standards_organizations_has_established_guidelines_for_installing_network_cables_in_commercial_buildings? TIA/EIA ITU ANSI IEER |
|
Definition
|
|
Term
CH2- Which technology does the IEEE 802.3 specification describe? a. Network Security b. Ethernet LANs c. Logical Link Control d. Token Ring LANs |
|
Definition
|
|
Term
CH2- Which of the following IEEE specifications pertains to wireless networking? a. 802.1 b. 802.3 c. 802.7 d. 802.11 |
|
Definition
|
|
Term
CH2- Which layer of the OSI model is responsible for issuing acknowledgments? (ACKs)? a. Application Layer b. Data Link Layer c. Network Layer d. Transport Layer |
|
Definition
|
|
Term
CH2- Which OSI model layer is responsible for keeping open a communications path between your computer and the server when you dial in to a remote access server? a. Physical Layer b. Data Link layer c. Presentation Layer d. Session Layer |
|
Definition
|
|
Term
Ch2- Suppose your network is connected to another network via a router. Which OSI model layer provides the information necessary to direct data between the two networks? a. Network Layer b. Physical Layer c. Data Link Layer d. Session Layer |
|
Definition
|
|
Term
CH2- In which two layers of the OSI model do NICs belong? a. Presentation and Application layers b. Transport and Network layers c. Network and Data Link layers d. Physical and Data Link layers |
|
Definition
|
|
Term
CH2- Which standards organization developed the OSI model? a. ISO b. ITU c. ISOC d. OSI |
|
Definition
|
|
Term
Ch2- Under what circumstances would the Transport layer use segmentation? a. When too many data frames are flooding into a receiving node's NIC b. When more than 10 percent of transmitted frames are damaged c. When the destination node cannot accept the size of the data blocks transmitted by the source node d. When the source node request that data blocks be segmented for faster processing |
|
Definition
|
|
Term
CH2- Which OSI model layer generates and detects voltage so as to transmit and receive signals carrying data? a. Physical Layer b. Data Link layer c. Network Layer d. Transport Layer |
|
Definition
|
|
Term
CH2- What type of address follows a hierarchical format? a. Physical address b. MAC addresses c. Network addresses d. Data Link layer addresses |
|
Definition
|
|
Term
If the TCP protocol did not receive an acknowledgment for data it transmitted, what would it do? a. Issue it own acknowledgement, indicating to the recipient that it did not receive the acknowledgment it expected b. Issue a warning frame to tell the recipient it would retransmit the data if it did not receive the acknowledgment within a certain time frame c. Retransmit the data to the recipient d. Reestablish the connection with the recipient |
|
Definition
|
|
Term
CH2- You have just installed a new NIC in your computer and see the following stamped onit: 000A5E1A8DA2. This unique identifier is an example of what kind of address? a. Virtual address b. MAC address c. Network address d. IP Address |
|
Definition
|
|
Term
CH2- Which part of a MAC address is unique to each manufacturer? a. The destination ID b. The block ID c. The physical node ID d. The segment ID |
|
Definition
|
|
Term
CH2- What is the purpose of the trailer field added to a frame in the Data Link layer? a. To mark the end of a frame b. To indicate the rate at which a node can receive the data c. To encode the sum of the error-checking algorithm d. To represent the frame's sequence number |
|
Definition
|
|
Term
CH2- What are the sublayers of the Data Link layer as defined in the IEEE 802 standards? a. Logical Link Control sublayer and Media Access Control sublayer b. Transport Control sublayer and Media Access Control sublayer c. Logical Link Control sublayer and Physical Addressing sublayer d. Transport Control sublayer and Data Link Control sublayer |
|
Definition
|
|
Term
CH2- Which layer of the OSI model encapsulates Network layer packets? a. Physical layer b. Session layer c. Data Link layer d. Transport layer |
|
Definition
|
|
Term
Ch2- Suppose that, at the receiving node, a frame's FCS doesn't match the FCS it was issue at the transmitting node. What happens as a result? a. The receiving node's Transport layer assess the error and corrects it b. The receiving node's Data Link layer requests a retransmission c. The transmitting node's Transport layer immediately issues a replacement frame d. The transmitting node's Data Link layer assesses the error and corrects is |
|
Definition
|
|
Term
Ch2- In which of the following situations would it be most desirable to us a connectionless Transport layer protocol? a. when retrieving a spreadsheet from a busy file server b. When connecting to a graphics intensive Web site c. When viewing a movie clip on the Web d. When sending an email message to a long list of recipients |
|
Definition
|
|
Term
CH2- Which of the following would be found in a Data Link layer header? a. The packet's fragmentation offset b. The packet's sequence number c. The source's logical address d. The source's physical address |
|
Definition
|
|
Term
CH3- What is different about the method used to boost a digital signal's strength, compared with the method of boosting an analog signal's strength? |
|
Definition
A digital signal requires a repeater, which retransmits the signal in its original form, and an analog signal requires an amplifier, which increases the strength of both the signal and the noise it has accumulated. |
|
|
Term
CH3- Which of the following decimal numbers corresponds to the binary number 00000111? |
|
Definition
|
|
Term
CH3- A wave with which of the following frequencies would have the shortest wavelength? |
|
Definition
|
|
Term
CH3- What is the origin of the word modem? |
|
Definition
|
|
Term
CH3- With everything else being equal, which of the following transmission techniques is capableof the greatest throughput? |
|
Definition
|
|
Term
CH3- In addition to some types of data networks, which of the following use half-duplex communication? |
|
Definition
|
|
Term
CH3- In wavelength division multiplexing, two modulated signals are guarenteed to differ in what characteristics? |
|
Definition
|
|
Term
CH3- Which of the following can increase latency on a network? |
|
Definition
Adding 50 meters to the length of the network |
|
|
Term
CH3- You are helping to install a cable broadband system in your friend's home. She wants to bring the signal from where the service provider's cable enters the house to a room onanother floor, which means you have to attach a new cable to the existing one. What type of cable should this be? |
|
Definition
|
|
Term
CH3- What part of a cable protects it against environmental damage? |
|
Definition
|
|
Term
CH3- With everything else being equal, a network using which of the following UTP types willsuffer the most cross talk? |
|
Definition
|
|
Term
CH3- What are two advantages of using twisted pair cabling over coaxial cabling on a network? |
|
Definition
Twisted pair cable is less expensive, Twisted pair cable is more resistant to noise |
|
|
Term
CH3- Which of the following problems could be solved by using a crossover cable? |
|
Definition
You're missing a connectivity device, but need to exchange data between two laptops |
|
|
Term
CH3- Which of the following network transmission media offers the highest potential throughputover the longest distances? |
|
Definition
|
|
Term
CH3- In which of the following network links might you use SC connectors? |
|
Definition
A fiber-optic connection between a server and router. |
|
|
Term
CH3- What type of fiber-optic cable is used most frequently on LANs? |
|
Definition
|
|
Term
CH3- What is the purpose of cladding in a fiber-optic cable? |
|
Definition
it reflects the signal back to the core |
|
|
Term
CH3- Which of the following is a potential drawback to using fiber-optic cable for LANs? |
|
Definition
|
|
Term
CH3- In what part of a structured cabling system would you find users' desktop computers? |
|
Definition
|
|
Term
CH3- You've just recieved a new Cisco router for your data center, and it came with a roll-over cable. What can you do with this cable? |
|
Definition
Make a connection from the router's console port to your laptop's serial port and configurethe router from your laptop |
|
|
Term
CH3- What is the maximum distance specified in the structured cabling standard for a horizontalwiring subsystem? |
|
Definition
|
|
Term
CH3- Which of the following can occur as a result of improper cable termination? |
|
Definition
Cross talk, Noise, Data errors |
|
|
Term
CH3- If your MDF contains a 66 bock, the type of cable terminating at that punch-down block is probably what? |
|
Definition
UTP designed for telephone signaling. |
|
|
Term
CH3- Your campuswide WAN is experiancing slow Internet response times. When you call your Internet service provider to ask if they can troubleshoot the problem from their end, theywarn you that their responsiblities end at demarc. What do they mean? |
|
Definition
They will not diagnose problems beyond your organization's entrance facilities. |
|
|
Term
CH3- What is the maximum amount you should intwist twisted pair wires before inserting them into connectors? |
|
Definition
|
|
Term
CH4- What type of information must a protocol suite supply to be routable? |
|
Definition
|
|
Term
CH4- What field in an IP datagram can be used to indicate that a packet should be routed before any other packets? |
|
Definition
Differentiated services field |
|
|
Term
CH4- What happens to an IP datagram when its TTL reaches 1? |
|
Definition
It is discarded by the connectivity device |
|
|
Term
CH4- For which of the following nodes would it make the most sense to assign a static, rather than dynamic, IP address? |
|
Definition
the router that accepts all internet traffic for a company's LAN |
|
|
Term
CH4- What is the function of ARP? |
|
Definition
to obtain the MAC address of a host, and then map that MAC address to the host's IP address |
|
|
Term
CH4- Which of the following applications would be best suited to using UDP? |
|
Definition
Video transmission over the Web |
|
|
Term
CH4- Suppose you have a workstation that uses the IP address 203.12.176.55 on a traditional IPv4 network. To what network class does the workstation belong? |
|
Definition
|
|
Term
CH4- How many bytes are used for an IPv4 IP address? |
|
Definition
|
|
Term
CH4- Suppose your computer's IP address is 155.61.9.188, and your network administrator has not subnetted the network to which you're connected. What is your computer's subnet mask? |
|
Definition
|
|
Term
CH4- Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To what device(s) are you transmitting? |
|
Definition
All devices on your network segment |
|
|
Term
CH4- Suppose you send data to an address that begins with the Format Prefix FF0E on a network running IPv6. To what device(s) are you transmitting? |
|
Definition
All devices that are reachable |
|
|
Term
CH4- What is the main difference between BOOTP and DHCP? |
|
Definition
BOOTP relies on a static table to associate IP addresses with MAC addresses, whereas DHCP does not. |
|
|
Term
CH4- If you are connected to a network that uses DHCP, and you need to terminate your Windows Vista workstation's DHCP lease, which of the following commands would you use? |
|
Definition
|
|
Term
CH4- At a minimum, what fields would you find in a hosts file? |
|
Definition
|
|
Term
CH4- What devices are the highest authorities in the domain name system hierarchy? |
|
Definition
|
|
Term
CH4- On a client/server network, what computer initiates the process of assigning an IP address through DHCP? |
|
Definition
|
|
Term
CH4- You issue a transmission from your workstation to the following socket address on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using? |
|
Definition
|
|
Term
CH4- You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and taking notes. Clients need access to the Internet, so you have configured your network's DHCP server to issue them IP addresses automatically. What DHCP option should you modify to make sure you are not wasting addresses that were used by clients who have completed a class and no longer need them? |
|
Definition
the lease duration for client computers |
|
|
Term
CH4- You manage a server that allows university students to use Telnet to make a connection, then use FTP to upload their homework. Professors also pick up students' homework by telnetting to the computer and using FTP. You have decided to change the FTP port number on the server from its default number to 23, for better security. Assuming students and professors make no changes to their default workstation configurations, what will be the result of this change? |
|
Definition
Students and professors will be unable to Telnet to the server or FTP files to or from the server. |
|
|
Term
CH4- What method of transmission does a workstation use to send an ARP request? |
|
Definition
A broadcast to all the nodes on its segment |
|
|
Term
CH4- If you want to determine only whether the TCP/IP protocols are installed and functioning properly on your workstation, you could: |
|
Definition
Attempt to ping the loopback address. |
|
|
Term
CH4- In class, you glance at your neighbor's computer and notice that she has typed the following IP address in her browser's URL text box: 127.0.0.1:80. What is she most likely attempting to do? |
|
Definition
Open a Web page that's on her own computer. |
|
|
Term
CH4- You have just set up a new wireless network in your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. Which of the following commands will allow you to find the information you need? |
|
Definition
|
|
Term
CH4- Which of the following represents the loopback address in IPv6? |
|
Definition
|
|
Term
CH4- Which of the following protocols assists in determining whether packets reached their destinations? |
|
Definition
|
|
Term
CH 5 You are asked to upgrade a bus topology LAN at a friends house to a star topology LAN. Your friend wants to connect three computers and a printer and use the Ethernet access method. His computers do not contain wireless NIC's. At minimum, which of the following devices must you add to his current networking hardware? |
|
Definition
|
|
Term
CH 5 Which of the following topologies is susceptible to signal bounce? |
|
Definition
|
|
Term
CH 5 What type of topology is required for use with a 100Base-TX network? |
|
Definition
|
|
Term
CH 5 Your school's network has outgrown its designated telco rooms, so you decide to house a few routers in an old janitors closet temperarily. However, since the closet has no power outlets, you will have to supply the routers power over the network. If you're lucky, your LAN already uses which of the following Ethernet standards that will allow you to do that? |
|
Definition
|
|
Term
CH 5 What is the minimum cabling standard rewuired for 10GBase-T Ethernet? |
|
Definition
|
|
Term
CH 5 Which of the following is a potential problem with daisy-chaining hubs on a 10Base-T network? |
|
Definition
Exceeding the maximum network length |
|
|
Term
CH 5 Why is packet switching more efficient than circuit switching? |
|
Definition
In packet switching, packets can take the quickest route between nodes and arrive independently of when other packets in their data stream arrive |
|
|
Term
CH 5 You are part of a team of engineers who work for an ISP that connects large data centers, telephone companies, and their customers throughout California and Oregon. Management has decided that the company can make large profits by promising the utmost Qo5 to certain high-profile customers. Which of the following switching methods will best guarantee the promised Qo5? |
|
Definition
|
|
Term
CH 5 What happens in CSMA/CD when a node detects its data has suffered a collision? |
|
Definition
It signals to the network that its data was damaged in a collision, waits a brief period of time before checking the network for activity, and ten retransmits the data. |
|
|
Term
CH 5 Why are Ethernet_2 frames preferred over Ethernet_802.3 frames on contemporary LAN's? |
|
Definition
They can support multiple higher-layer protocols, and Ethernet_802.3 frames cannot |
|
|
Term
CH 5 What is the purpose of padding in an Ethernet frame? |
|
Definition
Ensuring that the data portion of the frame totals at least 46 bytes |
|
|
Term
CH 5 You are designing a 100Base_T network to connect groups of workstations in two different offices in your building. The offices are approximately 250 meters apart. If you only use repeating devices to connect the workstation groups, how many hubs will you need? |
|
Definition
|
|
Term
CH 5 On a 10Base-T network, which of the following best describes how the wires of a UTP cable are used to transmit and receive information? |
|
Definition
One wire pair handles data transmission, while another wire pair handles data reception |
|
|
Term
CH 5 What techniwue is used to achieve 1-Gbps throughput over a Cat 5 cable? |
|
Definition
Al four wire pairs are used for both transmission and reception |
|
|
Term
CH 5 Which of the following Ethernet standards is specially encoded for transmission over WAN's using SONET technology? |
|
Definition
|
|
Term
CH 5 Which two of the following might cause excessive data collisions on an Ethernet network? |
|
Definition
A server on the network contains a faulty NIC The overall network length exceeds IEEE 802.3 standards for that network type |
|
|
Term
CH 5 In which of the following examples do the workstations necessarily share a collision domain? |
|
Definition
Two computers connected to the same hub |
|
|
Term
CH 5 What are the minimum and maximum sizes for an Ethernet frame? |
|
Definition
|
|
Term
CH 5 Which of the following network technologies does not use circuit switching? |
|
Definition
|
|
Term
CH 5 Which of the following is the type of 10Gigabit Ethernet that can carry signals the farthest, nearly 25 miles? |
|
Definition
|
|
Term
CH 1 Which of the following distinguishes peer-to-peer networks from client/server networks? |
|
Definition
In peer-to-peer networks, no single computer has more authority than another, by default. |
|
|
Term
CH 1 Which of the following is an advantage of using a peer-to-peer network over using a client/server network? |
|
Definition
A peer-to-peer network is easier to set up. |
|
|
Term
CH 1 Which of the following is an advantage of using a client/server network over using a peer-to-peer network? |
|
Definition
A client/server network allows for easier expansion. |
|
|
Term
CH 1 The first services widely used by networks were: |
|
Definition
|
|
Term
CH 1 Suppose you wanted to share documents among several computers in your household in a peer-to-peer fashion. You could do that by properly configuring which of the following types of software? |
|
Definition
Desktop operating system software |
|
|
Term
CH 1 What is the primary function of a file server on a network? |
|
Definition
It manages access and use of shared applications and data. |
|
|
Term
CH 1 On most LANs, a computer acting as a server differs from a computer acting as a client in which of the following ways? (Choose two answers.) |
|
Definition
The server would run a different operating system than the client
The server would possess greater processing power than the client. |
|
|
Term
CH 1 In which of the following environments would a MAN be most appropriate? |
|
Definition
A corporate headquarters connecting its five buildings across a small campus |
|
|
Term
CH 1 Which of the following describes the combination of voice (such as telephone), video, and data signals sent over the same network? |
|
Definition
|
|
Term
CH 1 What is the term used to describe a discrete unit of data that is sent from one node to another over the network? |
|
Definition
|
|
Term
CH 1 How can a server tell the difference between many clients on a network? |
|
Definition
Each is identified by a unique network address |
|
|
Term
CH 1 What device connects a client computer to a network's medium, such as a wire? |
|
Definition
|
|
Term
CH 1 Which of the following is one function of a network protocol? |
|
Definition
To ensure that data arrives at its destination in the proper sequence |
|
|
Term
CH 1 The physical layout of nodes on a network is known as the network's: |
|
Definition
|
|
Term
CH 1 Which of the following is an example of a mail service? |
|
Definition
Exchanging messages between mail servers on different networks |
|
|
Term
CH 1 Which of the following network topologies is most common on today's networks? |
|
Definition
|
|
Term
CH 1 Which of the following is an example of a network management service? |
|
Definition
Alerting the network administrator when a critical connectivity device |
|
|
Term
CH 1 Security is a concern when using remote access servers on a network because |
|
Definition
Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world. |
|
|
Term
CH 1 Distributing data transfer activity equally over several devices or components belongs to which category of network management services? |
|
Definition
|
|
Term
CH 1 What organization sponsors the CCNA and CCIE certifications? |
|
Definition
|
|
Term
CH 6 If you purchase a new desktop computer today, wht type of expansion board NIC is it most likely to contain? |
|
Definition
|
|
Term
CH 6 If you purchase a new laptop today, what type of NIC is it most likely to have? |
|
Definition
|
|
Term
CH 6 Which two of the following IRQs could you probably assign to a NIC without causing a conflict with preassigned devices? |
|
Definition
|
|
Term
CH 6 A certain computer on your fast ethernet network seems to be acting sluggish. After ensuring the 10/100 Mbps NIC is not malfunctioning, you decide to find out whether it's configured to transfer data at 10 Mbps rather than 100 Mbps, as it should be. How could you find this information and change it, if necessary? |
|
Definition
By modifying the NIC's EEPROM setting using its configuration utility |
|
|
Term
CH 6 Suppose computers on your home office network are connected to a single hub (A), but now you need to expand the network. You purchase another hub (B). Assuming you use a straight-through (not a crossover) cable, what port on hub A will you use to connect it to hub B? |
|
Definition
|
|
Term
CH 6 You and a friend decide to set up Fast Ethernet networks in your respective houses to connect a half-dozen computers. Bothe of you will connet your networks to high-speed Internet connections. As the connectivity device for end nodes, you purchase a router whereas your friend purchases a 12-port hub. Which of the following will your network do that your friend's network won't do? |
|
Definition
Filter traffic based on IP address |
|
|
Term
CH 6 You are a network technician working on a 100Base-T network. A coworker has been having logging on to the server and asks whether you can quickly tell her if her workstation's NIC is operating properly. You do not have the NIC's utility disk on hand, but you look at the back of her workstation and learn that although the nIC is properly installed and connected to the network, something's wrong with it. What might you have seen that causes you to come to this conclusion? |
|
Definition
|
|
Term
CH 6 How do bridges keep track of whether they should forward or filter frames? |
|
Definition
They maintain a filtering database that identifies which frames can be filtered and which should be forwarded, based on their destination MAC address. |
|
|
Term
CH 6 Which of the following is an advantage of using switches rather than hubs? |
|
Definition
Switches can assign dedicated channels to every node, making their transmissions more secure. |
|
|
Term
CH 6 What potential problem does STP address? |
|
Definition
|
|
Term
CH 6 In cut-through switching, which frame field does the switch never read? |
|
Definition
|
|
Term
CH 6 You are asked to configure a backbone swithc that connects servers supplying oceanic and atmospheric data to mariners and pilots around the world. Your networks traffic load is very high at all times, day and night. What type of switching do you configure the switch to be? |
|
Definition
Store-and-forward switching |
|
|
Term
CH 6 Which of the following devices separates collision domains? |
|
Definition
All of the above (Bridge, Switch, Router) |
|
|
Term
CH 6 Suppose your company's network contains two separate VLANs. Computer A is on the Customer Service VLAN and Computer B is on the Warehouse VLAN. Besides a Layer 2 switch, what device is required for Computer A and Computer B to exchange data? |
|
Definition
|
|
Term
CH 6 Which of the following devices can act as a gateway? |
|
Definition
All of the above (Router, Desktop workstation, Laptop) |
|
|
Term
CH 6 Why can't routers forward packets as quickly as bridges can? |
|
Definition
Routers operate at Layer 3 of the OSI model and, therefore, take more time to interpret logical addressing information |
|
|
Term
CH 6 In STP, what device acts as a guide to setting the best paths between switches? |
|
Definition
|
|
Term
CH 6 What switching technique allows you to funnel traffic belongin to more than one VLAN through a single switch interface? |
|
Definition
|
|
Term
CH 6 Which of the following identifies the VLAN to which each piece of data belongs? |
|
Definition
A tag added to each frames's header |
|
|
Term
CH 6 Which of the following routing protocols is used on the Internet's backbone? |
|
Definition
|
|
Term
CH 6 Which of the following routing protocols allows routers to exchange information about best paths with their neighboring routers only? |
|
Definition
|
|
Term
CH 6 Why is a large, busy network more likely to use dynamic routing? |
|
Definition
Because dynamic routing automatically selects the most efficient route between nodes, reducing the possibility for human error |
|
|
Term
CH 6 A packet on a network using the RIP routing method has been passed from one connectivity device to another 15 times. What happens when it gets passed to one more device? |
|
Definition
|
|
Term
CH 6 What is the main difference between a Layer 3 switch and a router? |
|
Definition
A Layer 3 switch is optimized for fast data handling: a router is optimized for accurate data delivery. |
|
|
Term
CH 6 At which layers of the OSI model are gateways capable of functioning? |
|
Definition
|
|
Term
CH 10 Convert the following subnet mask ino its dotted-decimal equivalent: 11111111 11111111 11111000 00000000. |
|
Definition
|
|
Term
CH 10 What is the default subnet mask for a Class A network? |
|
Definition
|
|
Term
CH 10 A node on a network has an IP address of 140.133.28.72 and its subnet mask is 255.248.0.0. What type of subnetting has been used on this network? |
|
Definition
|
|
Term
CH 10 On a network with an IP address of 140133.28.72 (or 10001100 10000101 00011100 01001000) and a subnet mask of 255.248.0.0 (or 11111111 11111000 00000000 00000000), what is the network ID? |
|
Definition
140.248.0.0 (11111111 11111000 00000000 00000000) |
|
|
Term
CH 10 As a networking consultant, you've been asked to help expand a client's TCP/IP network. The network administrator tells you that the network ID is subnetted as 185.27.54.0/26. On this network, how many bits of each IP address are devoted to host information? |
|
Definition
|
|
Term
CH 10 If you worked on an older network that could not interpret classless addressing , and your network ID was 145.27.0.0, what is the theoretical maximum number of different subnets you could create on this network? |
|
Definition
|
|
Term
CH 10 You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this? |
|
Definition
|
|
Term
CH 10 If you subdivide your Class B network into 254 subnets, what is the maximum number of hosts you can assign to any single subnet? |
|
Definition
|
|
Term
CH 10 Your company has leased a Class C network whose network ID is 205.61.128.0. You want to create 16 subnets within this network. One of the subnets will have an extended network prefix of 205.61.128.64. What will be the broadcast address for this subnet? |
|
Definition
|
|
Term
CH 10 Your workstation's IP address is 10.35.88.12, and your supervisor's workstation's IP address is 10.35.91.4. When you send data from your workstation to your supervisor's workstation, what is the most likely IP address of hte firest default gateway tha will accept and intercept your transmission |
|
Definition
|
|
Term
CH 10 You have decided to use PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP in order for all five clients in your office to be able to access servers on the Internet? |
|
Definition
|
|
Term
CH 10 You have offered to help a friend ste up he e-mail client software. She knows the email address that her ISP assigned her. Which of the following pieces of information will you need to configure her email software to successfully send messages? |
|
Definition
|
|
Term
CH 10 Which two of the following are benefits of using IMAP4 relative to POP3? |
|
Definition
-It allows users to review and delete mail w/o downloading it from the mail server. -It enables multiple users to easily share a central mailbox |
|
|
Term
CH 10 What Network layer protocol does the traceroute utility use to obtain its information about paths between a source and destination? |
|
Definition
|
|
Term
CH 10 Which of the following commands allows you to view the routing table on you Linux workstation? |
|
Definition
|
|
Term
CH 10 When you use the mtr command to assess the path from your office workstation to a server on your company's WAN that's located in Spain, what is the first hop the mtr commnad will display? |
|
Definition
Your default gateway's IP adddress |
|
|
Term
CH 10 If you know that your colleague's TCP/IP host name JSMITH, and you need to find out his IP address, which of the following commands should you type at your shell prompt or command prompt? |
|
Definition
|
|
Term
CH 10 Suppose your office's only DNS server was down, and you wanted to view the DNS address record for your comapny's domain. Which of the following TCP/IP utilities would allow you to do this? |
|
Definition
|
|
Term
CH 10 What utility might you use to find out whether your ISPs router is responsible for the poor network performance your organization experiences on a particular afternoon? |
|
Definition
|
|
Term
CH 10 Which of the following commands reveals the default gateway addresses fro all the hosts to which a router is connected? |
|
Definition
|
|