Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Block Test

Enter the letter for the matching Answer
incorrect
1.
List the three access areas related to physical security.
incorrect
2.
Display/edit the local systems routing table.
incorrect
3.
Inserts and securely seats individual cable wires into contact slots
incorrect
4.
How do you identify a package that requires special ESDS handling?
incorrect
5.
Which wireless network is achieved by wirelessly connecting coverage cells to provide services to an expanded geographical location?
incorrect
6.
Which protocol uses broadcast UDP data packets to exchange routing information?
incorrect
7.
Encryption, decryption, and data compression is also typically done at this layer of the OSI reference mode.
incorrect
8.
This type of wireless access point works as the client of the Wireless LAN Controller (WLC) and doesn’t make any forwarding decision.
incorrect
9.
To represent a binary IP address in a more user-friendly manner ___ is used.
incorrect
10.
Which type of ports are temporary allocations and only valid for the duration of the communication session?
incorrect
11.
NMSs deliver monitoring information in webpages called _____ made up of ____ views.
incorrect
12.
Three disadvantages of unguided/ unbound media are ____ , _____ and _____.
incorrect
13.
Measures network latency and loss
incorrect
14.
Displays IP settings for the computer on which this command is input.
incorrect
15.
The data link layer is divided into the _______ and _______ layers.
incorrect
16.
List the steps in network troubleshooting methodology.
incorrect
17.
Shielded twisted pair (STP) cables combines the techniques of ____ and _____ of wires to protect against signal degradation.
incorrect
18.
What are the protocols mentioned that require the reliable, ordered delivery of packets that the TCP protocol offers?
incorrect
19.
Which class of IPv4 address has network addresses of 128-191?
incorrect
20.
Shows information on all frames within your network (i.e. Wireshark).
A.
Shielding, Twisting
B.
route
C.
ESDS Caution Label
D.
Telnet, HTTP, SMTP, and FTP
E.
Punchdown Tool
F.
dashboards turn-key
G.
security, distortion and interference, and speed
H.
Routing information Protocol (RIP)
I.
Control Area Restricted Area No-Lone Zone
J.
1) Identify the problem, 2) Establish a theory of probable cause, 3) Test the theory, 4) Establish a plan of action, 5) Verify functionality, 6) Document the findings, actions and outcomes
K.
dotted decimal notation
L.
ipconfig
M.
Dynamic, Private, or Ephemeral Ports
N.
Lightweight Access Point
O.
Protocol Analyzer
P.
WWAN
Q.
Presentation Layer
R.
Class B
S.
pathping
T.
Media Access Control(MAC) Logical Link Control (LLC)
Type the Answer that corresponds to the displayed Question.
incorrect
21.
What are the ports called that range from 0-1023 and are assigned to common protocols and services?
incorrect
22.
Safety is the responsibility of _________
incorrect
23.
What ports are assigned by IANA and are designated for specific application services requested by an application?
incorrect
24.
NMSs generate ____ _________, a powerful first response tool that enables network administrators to visualize their networks, display devices and up- to-date status.
incorrect
25.
Which basic function of the NMS deals with real-time and historical reporting?
incorrect
26.
Which type of network cable has the TX and RX pins swapped on the opposite end of the cable and is used to connect like devices, such as switch to switch?
incorrect
27.
________ vulnerabilities can result in loss of confidentiality, availability, or integrity.
incorrect
28.
This type of wireless access point has either been installed on a secure company network without explicit authorization from a local network administrator or has been created to allow a hacker to conduct a man-in-the-middle attack.
incorrect
29.
What type of network relies on wireless as well as wired signals?
incorrect
30.
The User Datagram Protocol (UDP) is a _____ protocol because data is sent from one endpoint to another without prior arrangement and no guarantees that the data will reach the recipient.

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: BrotherH
Popular Computers sets