Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Network Technologies

Network technologies study guide

QuestionAnswer
Small office networks and home office networks are not considered __________________, but are _________________ networks. LAN's/proprietary
A ________________ is a group of computers and other devices connected together. Network
a LAN is a _________________ network usually wholly owned by the organization that constructs it. internal
Most LANs will have conncectivity to the internet through a ____________ but the LAN istelf is internal. router
the core purpose of the wireless device is to suport conncetivity for wireless clients the _______________ provides this connectivity. WAP (wireless Access Point)
the process where the public IP adresses used on the internet are translated to to private Ip addresses used on the internal network and vice versa Network Address Translation ( NAT)
_____________________ provides clients with IP addresses and other TCP/IP configuration information. Dynamic Host Configuration Protocol (DHCP)
A __________________________ is a part of a computer network that blocks unwanted traffic from the internet. ( providing a layer of protection for internal clients. firewall
What is used by administrators to configure, control, and manage users and computers? Group policy
What standards organization defines internet communication standards IETF (Internet engineering task force)
What standards organization defines the HTTP protocol? WC3 (World Wide Web Consortium)
What organization is dedicated to advancing technical innovation IEEE (Institute of electrical and electronics engineers)
What organization is a United Nations agency? ITU (INTERNATIONAL TELECOMMUNICATION UNION)
What type of traffic is transmitted by one computer and goes to all other computers on the subnet? Broadcast
_____________________ traffic can be transmitted across all computers on a network on an IPv4 network (subnet) but not from subnet to subnet. Broadcast
What type of traffic has the ability to travel across different subnets on an IPv4 network Multicast
Traffic sent from one computer to one other computer. Most other computers will not receive the traffic that is not addressed to them. Unicast Traffic
Which device connects networks together? Router
A _________________ creates both collision domains and separate broadcast domains Router
Category _____________ cable is rated for frequencies up to 100 megahertz and is designed to support full duplex transmissions over all four wire pairs on 1,000 Base-T Gigabit Ethernet networks. 5e
Category __________________& cable was created for 10Gbase-T installations with cable segments up to 100 meters long. 6A
What type of cable is fully shielded and screened, extends the frequency range, and provides full support for 40Gbase-T Ethernet networks? Category 8
What is the primary protocol that clients use to transfer data to and from web servers? HTTP
What protocol is used to transfer files to and from an FTP server? FTP (file transfer protocol)
the primary name resolution service that the internet and microsoft networks use. DNS (domain name system)
What layer of the OSI model interacts with the session and application layers by acting as a translator and determining how to format and present data? Presentation (layer 6)
What protocol is a set of rules that provides guaranteed delivery of data? TCP (transmission control protocol)
How many ports are available for either TCP or UDP? 65,536
A _________________________ is a unit of data at layer 3. packet
A ________________________ is a unit of data at layer 2. frame
What layer of the TCP/IP model uses protocols to access network resources? Application
What layer of the TCP/IP model controls data transfer on the network by managing sessions between devices? Transport
What layer of the TCP/IP model controls the movement and routing of packets between networks? Internet
______________________ was the first Ethernet standard 10Base5
Which Ethernet standard was developed in 1982? 10Base2
In an Ethernet frame, the "Preamble" field contains _____________bytes of alternating zeros and ones which the communicating systems used to synchronize their clock signals 7
The start of frame delimiter field contains 6 bits of alternating zeros and ones followed by two consecutive ones which is a signal to receiver that the transmission of the actual frame is about to begin. 6
Standard Ethernet networks use _________________ to verify the integrity of a link between two devices NLP (normal link pulse)
Ten-gigabit Ethernet networks support only _____________ , full-duplex communication on switched networks. Four-pair
Standard Cat6 cable used in 10Gbase-T networks can support segments up to ______________ long. 55 m
A __________________________ is a device that is located between a wired LAN and a wireless client WAP (WIRELESS ACCESS POINT)
Disabling an SSID (does/does not) help authentication or encryption when trying to improve network security. Does not
What wireless standard utilizes both the 2.4-gigahertz and 5-gigahertz frequencies? 802.11n
Which IEEE wireless standard was designed with a different frequency band to avoid interference in the crowded 2.4 gigahertz frequency band 802.11a
Which IEEE wireless standard increased the speed from 2 Mbps to 11 Mbps? 802.11b
Which IEEE wireless standard uses OFDM? 802.11g
Which IEEE wireless standard is backward compatible with 802.11g? 802.11b
What are the 4 advantages to using wireless networks in a business environment? 1.Better flexibility 2.Greater mobility 3.Improved scalability 4. Reduced costs
IPv4 addresses cover a range from ___________ to _____________. 0 to 255
Valid IP addresses have _________ decimal values separated by _____ dots. 4 /3
When using a computer running a Windows operating system, what command will show the IP address from the command prompt ipconfig
An IPv4 address consists of ________ bits. 32
Approximately how many IP addresses are available with IPv4? 4 billion
IPv6 uses _______ in the address. 128 bits
Approximately how many IP addresses are available with IPv6? 340 trillion, trillion, trillion
What is the decimal equivalent of hexadecimal b? 11
An IPv6 ____________________ transmission is traffic sent from one computer to one other computer. Unicast
An IPv6 __________ transmission is traffic sent from one computer to multiple other computers Multicast
An IPv6 ____________________ transmission is traffic sent from one host to one other host from a list of multiple host. Anycast
A _______________ transmits messages to a destination without first establishing a connection to the receiving system connectionless protocol
Data encapsulation packages the _________________ layer data into an IP datagram. Transport
There are a total of ____________ TCP ports. 65,536
____________________________ is the primary protocol used to deliver email over the internet and within internal Networks. Simple mail transfer protocol (SMTP)
Port Ranges for well known ports are numbered from ___________________ . These pores are associated with specific protocols. Ports and protocols in the well-known Port range are registered with the IANA 0 to 1023
Created by: Shawnt321
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards