Guide to Networking Essentials Ch 1-13 – Flashcards
Unlock all answers in this set
Unlock answersquestion
For any device to communicate with the computer, either through input or output, it must have what special software installed?
answer
device driver
question
The XYZ company has two offices, one downtown, and a brand new office in the newer section of town. To connect the two offices, they will need a dedicated line, probably leased from the local phone company. What type of network will they be implementing to connect their two offices?
answer
MAN
question
What is one of the disadvantages of a peer-to-peer network compared to a server-based network?
answer
limited security
question
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
answer
encapsulation
question
Which component, located on the motherboard, carries out all the instructions provided by computer programs?
answer
CPU
question
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
answer
NIC driver
question
You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?
answer
PCI-Express
question
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
answer
peer-to-peer network
question
increase the processing power, you need a CPU that provides more than one processor. What is this CPU called?
answer
multicore
question
You're the network administrator for a company located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing?
answer
WAN
question
In a physical bus topology, both ends of the medium must be terminated in order to prevent what?
answer
signal bounce
question
What does the frame trailer consist of in an Ethernet frame?
answer
cyclic redundancy check
question
What is the IEEE standard governing wireless networking?
answer
802.11
question
What is the main advantage of a point-to-point topology?
answer
data travels on a dedicated link
question
What is the media access method used by Ethernet?
answer
CSMA/CD
question
What type of logical topology is at work when using an Ethernet hub?
answer
logical bus
question
When discussing Ethernet standards, what does the XBaseY terminology refer to?
answer
the transmission speed, the type of transmissions, and the length or type of cabling
question
When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?
answer
100 meters
question
Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling?
answer
operates in half-duplex only
question
Which of the following is NOT an advantage of a physical star?
answer
provides redundancy and fault tolerance
question
A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once. 1—backbone cabling 2—entrance facility 3—equipment room 4—horizontal wiring 5—telecommunications closet 6—work area
answer
2, 1, 3, 1, 5, 4, 6
question
Terrestrial and satellite systems are two types of which wireless networking technology?
answer
microwave
question
What are all of the connections in a network considered, including the cables and their connectors?
answer
cable plant
question
What is a disadvantage of using fiber-optic cabling?
answer
difficult to install
question
What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?
answer
structured cabling
question
What type of wiring should be used for a high-speed connection between two buildings?
answer
fiber-optic cabling
question
When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?
answer
attenuation
question
Which of the following connections might require a crossover cable?
answer
switch to switch
question
Which of the following is a length of cable that connects a computer to either a networking device or to an RJ-45 jack?
answer
patch cable
question
Which of the following is not a form of electromagnetic interference, or EMI?
answer
rain/fog
question
How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits?
answer
16
question
In what layer does the NIC operate?
answer
Network Access
question
In which layer does a router operate?
answer
Internetwork
question
The last 64 bits of an IPv6 address are the interface identifier. Where is that number derived from?
answer
the MAC address
question
The Transport layer deals with which unit of information?
answer
segment
question
What is the binary number system based on?
answer
powers of 2
question
What is the decimal equivalent to the binary number 11000001?
answer
193
question
Which of the following is not a function of the Network Access layer?
answer
delivers packets efficiently
question
Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID?
answer
subnet mask
question
You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address?
answer
PAT
question
At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this process called?
answer
encapsulation
question
At what layer do NICs operate?
answer
Data Link
question
The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?
answer
MTU
question
What information would you find in the header of a Transport layer PDU?
answer
window size
question
What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand?
answer
6
question
Which is the IEEE standard that sets the standards for wireless networking?
answer
802.11
question
Which layer is responsible for determining the best path a packet should travel across an internetwork?
answer
Network
question
Which layer is responsible for establishing a connection between the source and destination?
answer
Session
question
Which layer of the OSI model is responsible for encryption and decryption?
answer
Presentation
question
You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem?
answer
Network layer device
question
Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called?
answer
smart
question
Each interface on a router must have an IP address and what else to be able to communicate on the network?
answer
MAC address
question
he time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?
answer
convergence
question
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
answer
wardriver
question
When an access control list is applied on a router's interface, that interface is performing a specific function on the packets that it receives. What is that function called?
answer
packet filtering
question
Which is the PCI bus type that has the highest possible transfer rate?
answer
PCIe
question
Which of the following combinations will you find in a switching table?
answer
MAC address/switch port number
question
Which of the following is not a function that would be found in a managed switch?
answer
the ability to transfer it's switching table with neighboring switches
question
Which of the following is the fastest switching mode?
answer
cut-through
question
Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?
answer
STP
question
In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?
answer
system monitor
question
Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task?
answer
cooperative
question
What directory service protocol used in Linux systems is also supported by Windows?
answer
LDAP
question
What is a partial copy of a VM that is used to restore it to a previous state?
answer
snapshot
question
What is the native file-sharing protocol in Linux?
answer
NFS
question
What method does the CPU use to divide its computing cycles between more than one process?
answer
time slicing
question
Which common e-mail protocol allows the user to access messages, yet still have them stored on the server?
answer
IMAP
question
Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?
answer
Datacenter Edition
question
Which of the following virtualization products provides hosted virtualization?
answer
VMware Workstation
question
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation?
answer
host-only
question
A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?
answer
It's the organizationally unique identifier for the manufacturer of the device.
question
A wireless router is actually composed of three devices, a wireless access point and which two other devices?
answer
a router and a switch
question
At which layer would you find errors that were caused by EMI?
answer
Physical
question
Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?
answer
MAC address
question
How does a switch "learn" MAC addresses?
answer
The switch reads each frame and makes a note of where each MAC address came from.
question
How many bits are in an IPv6 address?
answer
128
question
In wireless networks, what type of media access control is used?
answer
CSMA/CA
question
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
answer
ARP
question
TCP establishes a connection with the destination device using which process?
answer
three-way handshake
question
What command would you issue from the command prompt to test whether your computer has connectivity to the network?
answer
ping IPaddress
question
What does it usually mean when the activity light on a switch is blinking?
answer
It is communicating with the network.
question
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
answer
additional costs
question
What is the best way to eliminate the possibility of collisions in a network?
answer
Only use switches. Use NICs that operate in full-duplex mode. (Both are correct)
question
What is the IEEE standard that governs all forms of Ethernet media?
answer
802.3
question
What is the main disadvantage of cable modem networking?
answer
It uses a bus topology.
question
What is the maximum cable length for both category 5e and category 6 UTP cable?
answer
100 m
question
What is the most common topology and technology combination in use today?
answer
switched / Ethernet
question
What is the way in which bit signals are represented on the network medium?
answer
encoding
question
What was the primary reason to create a network?
answer
share resources, communicate with e-mail, share information
question
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
answer
switch
question
When referring to network bandwidth, what is the basic unit of measurement?
answer
bits per second
question
Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control sublayer?
answer
Data Link
question
Which layer is responsible for the encoding of signals?
answer
1
question
Which of the following is NOT a component of an Ethernet frame header?
answer
4-byte frame check sequence
question
Which of the following is not a true statement regarding the function of a switch?
answer
It determines the path used based on the destination IP address.
question
Why is the use of a switch preferred over a hub?
answer
Devices on a hub have to share the available bandwidth; switches are intelligent - they read the frame and determine where to send it; switches can operate in full-duplex mode.
question
You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement?
answer
internetwork
question
In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?
answer
system monitor
question
Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task?
answer
cooperative
question
What directory service protocol used in Linux systems is also supported by Windows?
answer
LDAP
question
What is a partial copy of a VM that is used to restore it to a previous state?
answer
snapshot
question
What is the native file-sharing protocol in Linux?
answer
NFS
question
What method does the CPU use to divide its computing cycles between more than one process?
answer
time slicing
question
Which common e-mail protocol allows the user to access messages, yet still have them stored on the server?
answer
IMAP
question
Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?
answer
Datacenter Edition
question
Which of the following virtualization products provides hosted virtualization?
answer
VMware Workstation
question
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation?
answer
host-only
question
A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?
answer
dynamic
question
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
answer
mandatory
question
How many disks are needed to implement a RAID 1 + 0?
answer
4
question
In Linux, what is the command for viewing a file's contents onscreen?
answer
cat
question
The partition that contains the Windows OS files is known as the what type of partition?
answer
boot
question
What level of RAID does not provide fault tolerance?
answer
RAID 0
question
When a file is encrypted, what color does the file name appear in Windows Explorer?
answer
green
question
Where are the waiting print jobs stored until they can be sent to the print device?
answer
print queue
question
Which of the following is NOT a Linux file system?
answer
Whichever is NOT Ext3, Ext4 or ReiserFS
question
You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
answer
global
question
The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
answer
WPA2
question
The ultimate goal of network security is to protect which of the following?
answer
the customers who use the system, the organization and its employees, business partners who access the network
question
What is a policy that defines the methods involved when a user logs on to the network called?
answer
authentication
question
What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?
answer
NAT
question
When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
answer
USB key mode
question
Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
answer
Port
question
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
answer
smurf attack
question
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
answer
spyware
question
Which one of the following passwords meets Windows password complexity requirement?
answer
N3tworking1O1
question
Which protocol is used to encrypt data as it travels a network?
answer
IPSec
question
After you have set up a network for a small business, you may need to access the network remotely to provide support for the users. Which remote access option should not be used unless a secure connection can be established first?
answer
Telnet
question
Before you purchase any software for a small business, especially the OS, you should be aware of the number of users that are allowed to access the software. What document will give you that information?
answer
EULA
question
If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain data?
answer
5
question
If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain the OS and applications?
answer
1
question
If your network consists mostly of computers with Linux operating systems, which file-sharing system can you use that is native to Linux?
answer
NFS
question
What is CRM software?
answer
software that is used to keep track of customer information, including contact information and appointments
question
Which of the following is a new file-sharing option that can be used on the network if all the computers have Windows 7 installed?
answer
HomeGroup
question
Which of the following is not a requirement for most small business networks?
answer
complex WAN environment
question
Which of the following is not included in any edition of Windows Small Business Server?
answer
support for up to 500 users
question
You have been contracted to set up a network for a small business. The company currently has 100 users, and they are looking to expand. They want to use Microsoft Exchange Server for their e-mail and shared calendar feature What version of Windows Server would you suggest that they purchase?
answer
Windows Essential Business Server
question
Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies?
answer
T1 uses point to point, while frame relay makes use of virtual circuits.
question
Part of SONET's flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?
answer
fault tolerant bus
question
Select the true statement regarding analog and digital signals.
answer
* a) Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels. * b) Digital signals vary over time continually and can be represented by a sine wave, while analog signals are binary 1s and 0s using voltage levels c) A modem is not required to use a line that uses analog signals. d) On fiber optic media, a 1 bit can be represented as a pulsing analog signal.
question
The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
answer
Basic Rate Interface (BRI)
question
What is the local loop, or last mile?
answer
the connection between the demarcation point and the CO
question
When would you most likely NOT choose to use a leased line connection?
answer
when a nondedicated link is needed for backups
question
Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
answer
hosted platforms
question
Which one of the following is NOT a typical SONET data rate?
answer
OC-9001
question
Which statement about Multiprotocol Label Switching (MPLS) is true?
answer
MPLS works with any network layer protocol.
question
You have been asked to install a VPN remote access solution using Windows Server.What do you need to install?
answer
Routing and Remote Access Service (RRAS)
question
Following a massive infection of your network by a virus, you have been tasked with developing preventive measures for keeping the network infection free. What would be an effective preventive measure?
answer
Select the utility inside of Windows that allows the user to recover a previous system state. This utility monitors drives and partitions, as well as registry settings and system files.
question
Traceroute would be best suited for which of the following tasks?
answer
locating bottlenecks in a network
question
What does the ping message "Destination host unreachable" message mean?
answer
The pinged IP address is on the same network, but an ARP reply was not received.
question
What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
answer
protocol analyzer
question
When using tape backup, what should be done to ensure that the backups are viable?
answer
Verify data can be restored.
question
Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?
answer
ipconfig /all
question
You are currently troubleshooting a network issue with your ISP's customer support agent. The agent requests that you open up command prompt and type "ping 127.0.0.1". What does this accomplish?
answer
tests that the local IP stack is functioning
question
You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?
answer
incorrectly configured gateway address
question
Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
answer
The last full backup should be restored first, followed by the last successful differential backup prior to the drive failure.