click below
click below
Normal Size Small Size show me how
Network Technologies
Network technologies study guide
| Question | Answer |
|---|---|
| Small office networks and home office networks are not considered __________________, but are _________________ networks. | LAN's/proprietary |
| A ________________ is a group of computers and other devices connected together. | Network |
| a LAN is a _________________ network usually wholly owned by the organization that constructs it. | internal |
| Most LANs will have conncectivity to the internet through a ____________ but the LAN istelf is internal. | router |
| the core purpose of the wireless device is to suport conncetivity for wireless clients the _______________ provides this connectivity. | WAP (wireless Access Point) |
| the process where the public IP adresses used on the internet are translated to to private Ip addresses used on the internal network and vice versa | Network Address Translation ( NAT) |
| _____________________ provides clients with IP addresses and other TCP/IP configuration information. | Dynamic Host Configuration Protocol (DHCP) |
| A __________________________ is a part of a computer network that blocks unwanted traffic from the internet. ( providing a layer of protection for internal clients. | firewall |
| What is used by administrators to configure, control, and manage users and computers? | Group policy |
| What standards organization defines internet communication standards | IETF (Internet engineering task force) |
| What standards organization defines the HTTP protocol? | WC3 (World Wide Web Consortium) |
| What organization is dedicated to advancing technical innovation | IEEE (Institute of electrical and electronics engineers) |
| What organization is a United Nations agency? | ITU (INTERNATIONAL TELECOMMUNICATION UNION) |
| What type of traffic is transmitted by one computer and goes to all other computers on the subnet? | Broadcast |
| _____________________ traffic can be transmitted across all computers on a network on an IPv4 network (subnet) but not from subnet to subnet. | Broadcast |
| What type of traffic has the ability to travel across different subnets on an IPv4 network | Multicast |
| Traffic sent from one computer to one other computer. Most other computers will not receive the traffic that is not addressed to them. | Unicast Traffic |
| Which device connects networks together? | Router |
| A _________________ creates both collision domains and separate broadcast domains | Router |
| Category _____________ cable is rated for frequencies up to 100 megahertz and is designed to support full duplex transmissions over all four wire pairs on 1,000 Base-T Gigabit Ethernet networks. | 5e |
| Category __________________& cable was created for 10Gbase-T installations with cable segments up to 100 meters long. | 6A |
| What type of cable is fully shielded and screened, extends the frequency range, and provides full support for 40Gbase-T Ethernet networks? | Category 8 |
| What is the primary protocol that clients use to transfer data to and from web servers? | HTTP |
| What protocol is used to transfer files to and from an FTP server? | FTP (file transfer protocol) |
| the primary name resolution service that the internet and microsoft networks use. | DNS (domain name system) |
| What layer of the OSI model interacts with the session and application layers by acting as a translator and determining how to format and present data? | Presentation (layer 6) |
| What protocol is a set of rules that provides guaranteed delivery of data? | TCP (transmission control protocol) |
| How many ports are available for either TCP or UDP? | 65,536 |
| A _________________________ is a unit of data at layer 3. | packet |
| A ________________________ is a unit of data at layer 2. | frame |
| What layer of the TCP/IP model uses protocols to access network resources? | Application |
| What layer of the TCP/IP model controls data transfer on the network by managing sessions between devices? | Transport |
| What layer of the TCP/IP model controls the movement and routing of packets between networks? | Internet |
| ______________________ was the first Ethernet standard | 10Base5 |
| Which Ethernet standard was developed in 1982? | 10Base2 |
| In an Ethernet frame, the "Preamble" field contains _____________bytes of alternating zeros and ones which the communicating systems used to synchronize their clock signals | 7 |
| The start of frame delimiter field contains 6 bits of alternating zeros and ones followed by two consecutive ones which is a signal to receiver that the transmission of the actual frame is about to begin. | 6 |
| Standard Ethernet networks use _________________ to verify the integrity of a link between two devices | NLP (normal link pulse) |
| Ten-gigabit Ethernet networks support only _____________ , full-duplex communication on switched networks. | Four-pair |
| Standard Cat6 cable used in 10Gbase-T networks can support segments up to ______________ long. | 55 m |
| A __________________________ is a device that is located between a wired LAN and a wireless client | WAP (WIRELESS ACCESS POINT) |
| Disabling an SSID (does/does not) help authentication or encryption when trying to improve network security. | Does not |
| What wireless standard utilizes both the 2.4-gigahertz and 5-gigahertz frequencies? | 802.11n |
| Which IEEE wireless standard was designed with a different frequency band to avoid interference in the crowded 2.4 gigahertz frequency band | 802.11a |
| Which IEEE wireless standard increased the speed from 2 Mbps to 11 Mbps? | 802.11b |
| Which IEEE wireless standard uses OFDM? | 802.11g |
| Which IEEE wireless standard is backward compatible with 802.11g? | 802.11b |
| What are the 4 advantages to using wireless networks in a business environment? | 1.Better flexibility 2.Greater mobility 3.Improved scalability 4. Reduced costs |
| IPv4 addresses cover a range from ___________ to _____________. | 0 to 255 |
| Valid IP addresses have _________ decimal values separated by _____ dots. | 4 /3 |
| When using a computer running a Windows operating system, what command will show the IP address from the command prompt | ipconfig |
| An IPv4 address consists of ________ bits. | 32 |
| Approximately how many IP addresses are available with IPv4? | 4 billion |
| IPv6 uses _______ in the address. | 128 bits |
| Approximately how many IP addresses are available with IPv6? | 340 trillion, trillion, trillion |
| What is the decimal equivalent of hexadecimal b? | 11 |
| An IPv6 ____________________ transmission is traffic sent from one computer to one other computer. | Unicast |
| An IPv6 __________ transmission is traffic sent from one computer to multiple other computers | Multicast |
| An IPv6 ____________________ transmission is traffic sent from one host to one other host from a list of multiple host. | Anycast |
| A _______________ transmits messages to a destination without first establishing a connection to the receiving system | connectionless protocol |
| Data encapsulation packages the _________________ layer data into an IP datagram. | Transport |
| There are a total of ____________ TCP ports. | 65,536 |
| ____________________________ is the primary protocol used to deliver email over the internet and within internal Networks. | Simple mail transfer protocol (SMTP) |
| Port Ranges for well known ports are numbered from ___________________ . These pores are associated with specific protocols. Ports and protocols in the well-known Port range are registered with the IANA | 0 to 1023 |