• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/207

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

207 Cards in this Set

  • Front
  • Back
Servers that have a NOS installed require less memory, processing power, and storage capacity that clients because servers are called on to handle only light processing loads and requests from multiple clients.

false

The fundamental difference between a Switch and a router is that a Switch belongs only to its local network and a router belongs to two or more local networks.

true

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.

true

Static electricity is an electrical charge in motion.

false

The protocol data unit for the Physical layer of the OSI model is payload, or data.

false

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OS model?

layer 7

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

session layer

What is the name for the protocol data unit (PDU) of the Data Link layer?

frame

The segment or datagram protocol data unit exists at what layer of the OSI model?

Transport layer

In what network topology are devices daisy-chained together in a single line?

bus topology

What physical network topology consists of all connected devices connecting to one central device, such as a Switch?

star topology

The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below?

demarc

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

MSDS

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

FAIL-CLOSE

A standard network switch operates at what layer of the OSI model?

layer 2

Which of the following is not one of the disadvantages of peer-to-peer networks?

They lack scalability. They are not necessarily secure. They are impractical for connecting large numbers of computers. They centralize user account logins

Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as:

convergence

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

network

Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read:

presentation

lf a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as:

fragmentation

The process of adding a header to the data inherited from the layer above is called what option below?

encapsulation

When using a Windows domain, what is the domain-level account for each user known as?

global account

What mail protocol is used to send mail messages to a server?

smtp

What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event?

multicast distribution

Any Computer or device on a network that can be addressed on the local network is referred to aS a

node

What two encryption protocols are commonly used with the Hypertext Transfer Protocol?

tls


ssl

What two mail delivery protocols below can be used by a client application to receive e-mail from a server?

POP3


IMAP4

Which two protocols can be used to gain remote access specifically to a server's Command line interface, securely and unsecurely?

Telnet


Remote Desktop

What are the two main Transport Layer protocols?

TCP


UDP

Static electricity can cause what two types of damage in electronic components?

Catastrphic failure


upset failure

___ is an unsecured client server application / protocol that transferS files between two computers.

ftp

The Smallest network is a _____, which is a network of personal devices, such as the network you use when you Sync your Cellphone and your Computer.

Personal Area Network (PAN)

The Network layer header identifies sending and receiving hosts by their___

IP Address

The centralized directory database that contains user account information and Security for the entire group of computers in a Windows domain is called ___

Active Directory (AD)

Voice and video transmissions are _________, meaning you don't want to hear breaks in your conversation or see a buffering message when you watch a movie over the internet.

Delay-sensitive

A hexadecimal number is a number written in the base 16 number System.

True

DNS follows a centralized database model.

False

NetBIOS applications should be replaced as they are out-of-date.

True

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

False

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.

True

An IPv6 address consists of how many bits?

128

A port number, which identifies an application on a host, exists at what level of the OSI model?

Transport

What are the last two parts of a host name known as?

Domain name

What do the first 24 bits of a MAC address represent?

Organizationally unique Identifier (OUI)

What command below can be used to display a complete summary of all network interfaces in a Windows computer?

ipconfig /all

What top level domain is used for the air-transport industry?

.aero

How many clusters of root servers exist?

13

What range of ports is referred to as the "well-known" range of ports?

0-1023

A loopback IP address begins with what number?

127

Select the IPv6 address below that indicates a global unicast address:

2000::/3

Which protocol below is used to make an initial connection between hosts for transferring multimedia data, relying on other protocols once a connection is established?

SIP

The Network Time Protocol service uses what port number?

UDP 123

Select the name of the free, open source software that is by far the most popular DNS server Software:

BIND

Select the protocol below that is used to synchronize clocks on computers on a network:

NTP

When two IPv6 nodes are on the same network, they are referred to as which of the following?

Neighbors

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and Communicating with the network?

ping

What RFC outlines recommendations for private IP addresses?

RFC 1918

What protocol is commonly used to request configuration files from another computer?

TFTP

The MAC address, which is also known as the ___address, is embedded on every NIC and is assumed to be unique.

physical

A________ is a DNS client that requests information from DNS name servers.

Resolver

A____Consists of a host's IP address and the port number of an application running on a host, with a colon separating the two values.

SOCKET

_______are not used to find nodes on networks other than the local network.

Mac Address

The IP addresses 169.254.0.1 and 169.254.255.254 are both examples of_____

APIPA

What two types of IP addresses are used on the Internet?

IPv4


IPv6

Traditional MAC addresses are broken into two parts. Name these two parts.

block ID


device ID

What two names are used to describe the configuration in which internal and external DNS queries are handled by different DNS servers or by a single DNS server that is specially Configured to keep internal and external DNS zones separate?

split dns


split-horizon dns

What two address prefixes for IPv6 addresses are used for unique local unicast?

FC00::/7


FC00::/8

What two ipConfig Commands below are used to show DNS resolver cache information and clearthe name resolver cache?

ipconfig /displaydns


ipconfig /flushdns

UDP provides error checking, but not sequencing.

false

IP is an unreliable, connectionless protocol.

true

IPv4 and IPv6 use the same packet format.

false

AS a network Support technician, you only need to know how to support IPv6.

false

On IPv4 networks, IGMP operates at the Network layer of the OSI model to manage multicasting.

true

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Connection-oriented..Protocol Sequencing and checksums..Framing ..Flow Control

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

Differentiated Services (DiffServ)

A modern ASN consists of how many bits?

32

What netStat command option lists only current connections, including IP addresses and port numbers?

-n

By default, the pathping command sends how many pings per hop?

100

Which network routing protocol is a path vector protocol that sends updates between routers using TCP?

BGP

What protocol replaces ARP, GMP, and ICMPv4 on IPv6 based networks?

ICMPv6

At what layer of the OSI model would a TCP or UDP header be added to a payload?

Layer 4

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding?

Sliding Window

Which of the following is not a task handled by a router?

A router forwards broadcasts over the network

The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

TCP

What command can be used on a Cisco router to view the routing table?

show ip route

What parameter can be combined with the traceroute command to instruct it to use ICMP echo requests instead of UDP datagrams?

-I

What TCP field below allows the receiving node to determine whether a TCP segment is corrupted during transmission?

checksum

What happens when a router receives a packet with a TTL of O

The router drops the packet and sends an ICMP TTL expired message back to the host.

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

flow label

What IPv4 protocol handles multicasting for tasks such as videoconferencing or teleconferencing?

IGMP

What routing protocol criteria is defined as the time it takes to recognize a best path change in the event of a network outage?

convergence time

What type of routing protocol enables routers to communicate beyond neighboring routers, allowing each router to create a map of an entire network?

link state

The receiving host de-encapsulates the message at each layer in _____order and then presents the payload to the receiving application.

Reverse

The TCP________ is performed before TCP transmits the actual data.

Three-way handshake

________ 's lack of Sophistication makes it more efficient than TCP.

UDP

ICMP (Internet Control Message Protocol) is a _______layer core protocol that reports on the Success or failure of data delivery.

Network

A_______ joins two or more networks and passes packets from one network to another.

router

What address does ARP work in conjunction with IPv4 to discover? (Choose two)

MAC


PHYSICAL

Which of the following are types of entries an ARP table contains? (Choose two)

static


dynamic

What versions of the IP protocol are used on networks today?

ipv4


ipv6

Which layers of the OSI model are all routers able to interpret? (Choose two)

3 and 4

What two fields below are used by IPv4 and IPv6 respectively to limit the number of times that a packet can be forwarded on a network?

hop limit


TTL

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

True

A power fluctuation that results in a temporary dimming of lights is known as a blackout.

false

The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.

true

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.

false

A NIC card cannot determine whether the frames it transmits and receives are using IP packets or a different layer 3 protocol, because the NIC does not operate higher than Layer 2 of the OS model.

true

What type of power flaw involves a fluctuation in voltage levels caused by other devices on the network or by EMI?

noise

One watt is equal to how many volt-amps?

1.4

What is the maximum allowable distance for horizontal wiring?

100m

The radius of the maximum arc into which you can loop a cable without impairing data transmission is known as what option below?

bend radius

How far away from fluorescent lights or other sources of EMI should cable be installed?

at least 3 feet

What is the industry standard for rack height in rack units?

42u



Which method of transmission allows signals to travel in both directions over a medium simultaneously?

full duplex

Which method of transmission allows signals to travel in both directions over a medium but in only one direction at a time?

half duplex

Ethernet exists at what layer of the OSI model?

layer 2

What is the maximum frame size for Ethernet II frames on a VLAN

1522 bytes

When Selecting a punch down block, what block type is more suitable for data connections?

110 block

What Component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?

vertical cross connect

Where is a demarc located in relation to the structured cabling of an enterprise environment?

Main distribution frame (MDF)

The room where the_____ is located is called the data closet.

MDF

____ are highly scalable and have a very high fault tolerance, massive storage capabilities, and fast data access.

SAN

A _______allows for an MTU as high as 9198 bytes.

Jumbo Frame

To ensure that any ______are detected, frames are made large enough to fill the entire cable during transmission.

collisions

Digital signals are composed of pulses of precise, positive voltages and zero voltages.

true

A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port.

false

Multimode fiber contains a core that is larger than a single mode fiber core.

true

Because digital signals do not depend on amplitude or frequency differences to communicate information, they are more vulnerable to EMI noise.

false

A continuity tester should not be used on a live network segment.

true

Using DWDM, a single fiber can carry between what two numbers of channels?

80 - 160

What two items below are commonly expressed as bits transmitted per second?

bandwidth


throughput

What two connector types are typically used to terminate RG-6 and RG-59 cables?

f-connectors


BNC

Frequencies used to Convey speech over telephone lines fall between what two frequencies below?

300 hz - 3.3 khz

What is the maximum supported throughput and bandwidth/signal rate of Cat5e?

1000mbps or 1gb

A____ is a voltage, frequency, pulse, or phase change in an analog transmission.

symbol

A _________cable reverses all of the wires without regard to how they are paired.

rollover

_________Causes problems only when a receiving node is expecting some type of Communication, Such as the rest of the data stream it has begun to accept.

Latency

A__________ is a simple instrument that can measure many characteristics of an electric circuit, including its resistance, voltage, and impedance.

multimeter

A_________ is a device that retransmits a digital signal in its original form, extending the length of a segment.

repeater

What term below is used to describe the outer-most layer of protective covering of a coaxial cable?

sheath

What Ethernet standard below is also referred to as "thinnet"?

10base2

Select the component of enterprise level structured cabling that serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling:

entrance facility

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

no more than 1 inch of the cable should be exposed.

What cable type comes in two different modes, single mode and multimode?

Fiber optic

Which of the following options is not a likely source of electromagnetic interference?

Fiber optic cables

in order to simplify console access to Computers in a rack, what device is typically used to provide a central portal for all devices on the rack?

KVM switch

If the use of a pre-existing Ethernet infrastructure is desired for a SAN, what Transport Layer protocol should be utilized?

iSCSI

What type of power Converter changes the voltage of an AC current, such as when power over the main line from an electric company is changed before being delivered to a home?

transformer

Select the two terms below that are used to describe a UPS that provides continuous voltage to a device by Switching virtually instantaneously to the battery when it detects a loss of power:

standby UPS


failover power supply

The Standard that describes uniform, enterprise-wide cabling systems, regardless of who manufactures or Sells the various parts used in the system, can be referred to by what two options below?

TIA/EIA-568


IEEE Commercial Building Wiring Standard

Equipment racks most commonly come in what two widths?

19 inch frame


23 inch frame

Select the two Transport Layer protocols that are used by SANs:

iSCSI


Fibre Channel

Select the maximum allowable distances for horizontal wiring for a span that connects a data jack on a Wall to a data closet, and for a span that connects a workstation to the data jack, respectively:

90m


10m

A volt-ampere (VA) is the product of the voltage and the_________ of the electricity on a line.

current

The most common multiplexing technology used in conjunction with fiber optics is which option below?

DWDM

A device that is responsible for modulating digital signals into analog signals, and demodulating analog signals into digital signals at the receiving end, is known as?

A modem

Ethernet is an example of what type of technology?

baseband

Since cable TV and cable Internet can share the same coaxial cable, they are considered to be what type of technology?

broadband

Using a form of transmission that allows multiple signals to travel simultaneously over one medium is known as which of the following options?

multiplexing

All wireless signals are carried through the air by electromagnetic waves.

true

Unlike wired signals, wireless signals originate from electrical current traveling along a Capacitor.

false

Multipath signaling is a significant cause of fading.

True

NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.

False

The WPS PIN is vulnerable to brute force attacks.

true

What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?

diffraction

What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal?

scattering

Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?

iwconfig

How many address fields exist in an 802.11 frame?

4

What is the minimum category of UTP cable required in order to support Gigabit speeds?

cat 5e

What is the maximum supported throughput of a CAT6 cable?

10 Gbps

How many cable pairs are needed for 1000Base-T transmission over CAT5e cable?

4

Standard PoE devices must be provided with how much power in order to function?

15.4 watts

What is the maximum distance for 10GBase-ER and 10GBase-EW on a segment of single mode fiber?

40km

What type of Cross-talk occurs between wire pairs near the source of a signal?

near end cross talk

Which of the following connectors is the most common for multimode fiber?

MT-RJ

A measure of a signal's strength at any given time is known as which term below?

amplitude

The number of times that a wave's amplitude cycles from its starting point, through its highest amplitude and its lowest amplitude, and back to its starting point over a fixed period of time, is known as what term below?

frequency

WDM divides a beam of light into how many different wavelengths or colors?

40

Which type of multiplexing is defined by wavelength instead of frequency?

CWDM

Which option below reflects the standard impedance of an RG-6 cable?

75 ohms

Phone companies make use of what type of multiplexing in order to allow for phone services and DSL services over the same line?

FDM

Select below the band that is not one of the four frequency bands used in the 5 GHz range for WirelesS LANS:

5.1 ghz


5.3 ghz


5.4 ghz


5.9 ghz

5.9 ghz

Which of the following is not a valid wireless network topology?

bus


infrastructure


mesh


ad hoc

bus

ldeally, Stations must remain within what range of an access point in order to maintain optimal transmission speeds?

300 feet

At what layer of the OSI model do the 802.11 standards vary?

physical layer

Which 802.11 standard was the first to utilize the 5 GHz band?

802.11a

Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?

802.11ac

What is the maximum theoretical throughput of 802.11n?

600 mbps

What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point?

beacon frame

In IEEE terminology, a group of Stations that share an access point are said to be part of what option below?

basic service set

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

management frames

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?

control frames

How does the 802.11 data frame indicate how a large packet should be fragmented?

The sequence control field indicates how packets will be subdivided

Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?

MIMO

In an 802.11 data frame, what is the size of the frame check sequence field?

6 bytes

How many data streams are used in 802.11ac Wave 2 devices?

4 data streams

What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices?

1.3 gbps

The wireless spectrum, as defined by the FCC, spans between which two frequencies?

9 khz - 300 ghz

What two frequencies are used for most wireless networks?

2.4 ghz


5 ghz

At which two layers do wireless LANs operate?

layer 1 and layer 2

Which of the following are two different types of attacks against Bluetooth connections that can be used to send unsolicited data, or download data without permission?

bluejacking


bluesnarfing

What two terms describe a wireless network topology in which access points work as peer devices on the same network?

mesh WLAN


wireless mesh network (wmn)

________is an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal devices.

infrared

The proportion of noise to the strength of a signal is called the___________

SNR (signal to noise ratio)

Access points that include routing functions are also called__________

routers

____________is a form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).

NFC

All 802.11 standards use___________ signaling, meaning a wireless station can only transmit or receive, but cannot do both simultaneously.

half duplex