meshyou have implemented an ad-hoc wireless network that doesnt employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical topology has been implemented in this type of network?
directory and domainwhich 2 terms describes a group of computers and users that utilize centralized resources, administration, and security settings? workgroup / peer to peer / local area network/ directory / doamin
ringwhich of the following topologies connects each device to a neighboring device? acts like a repeater, sending the signal to the next device?
a network on a small geographic area, like an officedefinition for LAN
staryou have a small network that uses a hub to connect multiple devices. What physical topology is used? which of the following topologies connects each network device to a central hub?
meshyou have been asked to implement a network infrastructure that will accommodate failed connections. which of the following network topologies provides redundancy for a failed link?
messages travel from one device to the next until they reached the destination deviceyou have a network that uses logical ring topology. how do messages travel through the network?
messages are broadcast to all devices connected to the network., you have a network with a logical bus topology. how do messages travel through the network?
peer to peer networkwhat type of network describes a workgroup? ad-hock/ client-based / server based / peer to peer
centralized administration and scalabilitytwo advantages of using a domain to manage a network
switchwhat device is used to create a physical star topology?
peer to peer and workgroupwhich 2 terms refers to a network resources sharing model that uses access control lists saved on each computer? peer to peer / client-server/ workgroup/ domain/ directory
buswhat topology connects all devices to a trunk cable?
switchwhich of the following LAN devices receives a signal on one port, and forwards that signal only to the port where the destination device is connected?
hubwhat hardware devices regenerates a signal out all connected ports w/out examining the frame of packet contents
c0-42-ff-15-01-bewhich of the following is a valid mac address
32-9a-86-1g-b3-24c0-42-ff-15-01-be83-5a-5b-ob-31-55-f173-99-12-61-15
network interface card / NICwhich network components connects a device to the transmission media and allows it to send and receive messages?
bridge/ switch/ protocol/ NIC
ARP- address resolution protocola host wants to send a message to another host w/ an IP address. IP doesn’t know the hardware address of the destination device. which protocol can be used to discover the MAC address?
DHCPBOOTPDNSARP
when a frame enters a port, the source MAC address is copied from the frame headerhow do switches and bridges learn where devices are located on a network?
it connects multiple cable segments or devices, and it forwards frames to the appropriate segmentdescribe the switch functions
send the frame out ports 2-8an 8 port switch received a frame on port number 1. the frame is addressed to an unknown device. what will the switch do?
it demodulates analog data from a telephone network into digital pchow does a modem work (demodulate)
it modulates digital data from the PC into analog data and transmits it on a telephone networkhow does a modem work (modulate)
fiber opticwhat network type uses light pulses to transmit data
greater resistance to interferencewhat is a major benefit of STP over UTP?
RJ-11what kind of connector do you use to connect a modem to a standard telephone line?
F-Typeyou have a broadband home internet server that uses coaxial cable. Which connector type will you most likely use?
crimperwhich tool should you use to attach an RJ-45 connector to the end of a Cat 6 UTP cable?
greater cable distances w/out a repeater.
immunity to electromagnetic interference
what are 2 advantages of using fiber optic cabling for a network, as opposed to other types of cabling?
Green with whiteyou are using a crimpter to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?
plenumyou are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?
RJ-45which connector is used w/ UTP cable?
it uses two concentric metallic conductors and it has a conductor made from copper in the center of the cablewhich are characteristics of coaxial network cable?
Category 6 UTP and Category 5 UTPwhich 2 types of cabling could be used for an ethernet 100BaseT
streaming videowhich of the following applications is more likely to justify the investment in Category cable? streaming videoprintinginstant messaginge-mail
punchdown toolyou need to connect the end of a Cat 6 UTP cable to a 110 punch down block. Which tool should you use?
the network uses half-duplex communicationsyou have an ethernet network using a the 10Base-T standard. Network devices are connected together using hubs. What is true about the network?
the network operates at 10 mbps, and max cable distance is 100 meters10Base-T standard speed and cabling
the network operates at 1 gbps and the network uses copper UTP cables1000Base-T standard speed and cabling
100 metersfor 1000Base-T standard what is the maximum cable length allowed?
2. 2. 2. 2 and 172. 16. 1. 26which of the following is a valid IP address?
192. 168. 1. 512254. 7. 1. 4172. 2. 2. 21. 254. 0. 1024172. 16. 1. 26256. 0. 0. 1
223. 16. 5. 0, 192. 15. 5. 55, 222. 55. 0. 0which 3 IP addresses are class C addresses
125. 166. 11. 0223. 16. 5. 0189. 189. 5. 2192. 15. 5. 55240. 0. 0. 0222. 55. 0. 0
1-126class a ranges
128-191class b ranges
192-223class c ranges
224-240class d ranges
241-255class e ranges
the class defines the default network address portion of the IP addressdescribe an IP address class
255. 255. 255. 0what is the default subnet mask for the Ip address 203. 111. 3. 3
190. 65. 2. 0, 132. 12. 0. 0, 129. 0. 0. 0which of the following IP addresses are class B?
190. 65. 2. 0132. 12. 0. 064. 2. 2. 64195. 155. 0. 0129. 0. 0. 0224. 15. 55. 2115. 33. 0. 0
114. 122. 66. 12114. 58. 12. 0114. 0. 0. 15which of the following IP addresses belong to the Class A network 114. 0. 0. 0?
115. 0. 0. 66115. 88. 0. 55114. 122. 66. 12114. 58. 12. 0115. 77. 89114. 0. 0. 15
hosts file and DNSwhich mechanisms could you use to resolve a hostname into its associated IP address?
Computer, Network, Windows ExplorerWhich tool in Windows would you use to browse all networks and shared folders to which a user has access?
ComputerNetworkWindows NeighborhoodWindows ExplorerDevice ManagerComputer Management
A workstation must request addressing information from a DHCP server and… It can deliver a DNS server address in addition to the host IP addressTrue statements the Dynamic Host Configuration Protocol (DHCP)
Install the DHCP service on your serverYou are setting up a small network in your office w/ one Windows server and 50 Windows workstations. You want to spend as little time as possible configuration the workstations with IP addressing information. What should you do?
DHCPWhich service can you use on your network to automatically assign IP address to hosts and to help prevent the same address from being assigned to two different hosts?
Default gatewayWhich TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?
Network and Sharing CenterWhich tool would you use in Windows Vista/7 to manage network connections?
169. 254…Which of the following IP address ranges is reserved for Automatic Private IP Addressing?
191. 168. 2. 15129. 0. 0. 1168. 16. 5. 1Which of the following IP addresses have a default subnet mask of 255. 255. 0. 0?
191. 168. 2. 15129. 0. 0. 1228. 62. 18. 6123. 254. 19. 61. 6. 45. 254168. 16. 5. 1
hexidecimal numbers, 32 numbers, grouped using colonsmost common format for expressing IPv6 addresses?
128-bit address, eight hexadecimal quartetswhich of the following describes an ! Pv6 address?
FEC0:: AB: 9007Which of the following is a valid IPv6 address?
FEC0:: AB: 9007
FEC0: AB04: 899A
FEC0: 9087: AB04: 9900: 7GA2: 7788: CEDF: 349A
199. 12. 254. 11
FEC0: AB98:: A7:: 9845: 4567
POP3Which of the following protocols do e-mail clients use to download messages from a remote mail server?
NetBIOSWhich of the following protocols is non-routable and requires another protocol to enable internetwork communication?
IPYou want to use your Windows workstations to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this?
SMTPWhat protocol is used to send e-mail messages from a mail client to a mail server?
FTPYou want to allow your users to download files from server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?
53you’ve just installed the DNS service on a Windows server. Which port must be opened in the server’s firewall to allow clients to access the service?
11014212353
UDPYou are a software developer and you are creating a multimedia streaming application. Data will be streamed from your steaming server to streaming to streaming clients over IP network. Which transport protocol should your application use to send data between the clients and the server?
3389You’ve enabled Remote Desktop on a Windows workstation. Which port must be opened in the server’s firewall to allow remote clients to access the desktop?
533389110123
HTTPWhich IP protocol is used by Web browsers and Web servers to exchange files?
HTTPHTMLSSLSMTP
HTTP and HTTPSWhich protocols are used on the Internet to transmit Web pages from Web servers to Web browsers running on client workstations?
DNSYou want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?
IMAPWhich of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives user the option to keep mail messages on the server?
encryptionWhat feature is supplied by WPA2 on a wireless network?
SSIDWhat of the following is used on a wireless network to identify the network name?
MAC address filteringWhich of the following features on wireless network allows or rejects client connections based on the hardware address?
Backwards compatible with 802. 11b devices.
Operates in 2. 4 GHz range
Maximum bandwidth of 54 Mbps
Which of the following are characteristics of the 802. 11g wireless standard.
802. 11nYou are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2. 4 GHz. Which 802. 11 standard will work best in this situation?
disable SSID broadcastWhich of the following measures will make your wireless network less visible to the casual attacker performing war driving?
802. 11g and 802. 11aWhich IEEE wireless standards specify transmission speeds up to 54 mbps?
802. 11aWhich wireless standard operates at up to 54 Mbps to a maximum of 150 feet?
WPA and WEPWhich of the following are security protocols for wireless networks?
Correct WEP keyOn a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?
11 MbpsWhich data transmission rate is defined by the IEEE 802. 11b wireless standard?
Ad-hocwhat type configuration would you use if you wanted to deploy 802. 11n technology to communicate directly between two computers using a wireless connection?
Wireless clients must use a static IP address w/in the correct IP address range to connect to the network? what would clients use when the DHCP setting is disabled in a wireless network?
100 MWhat is the maximum range of the Bluetooth 2. 0 specification for Class 1 devices?
3 MbpsWhat is the maximum transmission speed for Bluetooth devices?
Wireless Ethernet and BluetoothYou want to use a wireless printer at home. The printer will be used by two computers in two different rooms. Which interfaces could be used to do this?
Bluetooth and WiFiYou need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. What would be the best choice?
ModemTo access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?
F-type connectors and RG-6 coaxial cableWhich of the following are used to connect a cable modem to the Internet connection?
copper telephone wireWhich type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?
RJ-11 and Filters or splittersyou are configuring a ADSL connection. Which of the following will be part of the configuration?
On connections leading to an analog phonewhen configuring an ADSL installation, where should you install the DSL filters?
dial-up connection, two data channels, and one control channelWhich 3 are features of Basic Rate ISDN (BRI)? 2 data channelsup to 24 data channelsthree control channelsdial-up connectionalways on connectionone control channel
ISDNWhat network technology is packaged as part of a BRI plan?
Update the firmwareYou recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the router.
Disable the DHCP on the AP // Confgure the AP to filter out unauthorized MAC addressesIf radio signals extend outside a building and concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network?
Backup generators and cordless phonesWhich (2) locations will contribute to the greatest amt of interference for a wireless access point?
to translate between Internet IP addresses and the IP addresses on your private network. What is a good reason to enable NAT?
near a windowWhere is the least secure place to locate the access point when creating a wireless network?
172. 18. 188. 6710. 0. 12. 15192. 168. 12. 253You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer?
32. 188. 99. 10127. 0. 0. 1224. 15. 166. 12172. 18. 188. 6710. 0. 12. 15192. 168. 12. 253240. 12. 188, 1
So multiple computers can share the single IP address used on the internet. What is the point of enabling NAT?
169. 254. 0. 1 – 169. 254. 255. 254What is not a range of IP addresses defined in RFC 1918 that are commonly used behind a NAT server
ipconfig / releaseWhich command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?
SSH and TelnetWhat 2 tools allow for the remote management of servers?
tracertYou suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?
-twhile troubleshooting a network connection, you decide to use the ping command. Which switch allows for a continuous ping?
netstatWhich utility would you use to view current connections and active sessions and ports on a computer?
ipconfig/allWhich command would you use to view the MAC address of the network?
ipconfig/renewWhich command would you use to request new IP configuration information from a DHCP server?
ping and tracerouteWhich commands can you use to test network connectivity between your workstation and the server?
nslookupwhich command produced this output?
nslookupa user having problems connecting to other computers using host names. Which of the following commands will help you troubleshoot this problem?
ping -lyou suspect large packets are being dropped on your network because of their large size. Which utility can you use to confirm your suspicion?
home groupYou have a Windows 7 computer connected to a small network that is not part of a domain. You want to see the computers and printers on the network. What feature do you use?