ch 6 test questions

mesh
you have implemented an ad-hoc wireless network that doesnt employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical topology has been implemented in this type of network?
directory and domain
which 2 terms describes a group of computers and users that utilize centralized resources, administration, and security settings? workgroup / peer to peer / local area network/ directory / doamin
ring
which of the following topologies connects each device to a neighboring device? acts like a repeater, sending the signal to the next device?
a network on a small geographic area, like an office
definition for LAN
star
you have a small network that uses a hub to connect multiple devices. What physical topology is used? which of the following topologies connects each network device to a central hub?
mesh
you have been asked to implement a network infrastructure that will accommodate failed connections. which of the following network topologies provides redundancy for a failed link?
messages travel from one device to the next until they reached the destination device
you have a network that uses logical ring topology. how do messages travel through the network?
messages are broadcast to all devices connected to the network.,
you have a network with a logical bus topology. how do messages travel through the network?
peer to peer network
what type of network describes a workgroup?
ad-hock/ client-based / server based / peer to peer
centralized administration and scalability
two advantages of using a domain to manage a network
switch
what device is used to create a physical star topology?
peer to peer and workgroup
which 2 terms refers to a network resources sharing model that uses access control lists saved on each computer?
peer to peer / client-server/ workgroup/ domain/ directory
bus
what topology connects all devices to a trunk cable?
switch
which of the following LAN devices receives a signal on one port, and forwards that signal only to the port where the destination device is connected?
hub
what hardware devices regenerates a signal out all connected ports w/out examining the frame of packet contents
c0-42-ff-15-01-be
which of the following is a valid mac address

32-9a-86-1g-b3-24
c0-42-ff-15-01-be
83-5a-5b-ob-31-55-f1
73-99-12-61-15

network interface card / NIC
which network components connects a device to the transmission media and allows it to send and receive messages?

bridge/ switch/ protocol/ NIC

ARP- address resolution protocol
a host wants to send a message to another host w/ an IP address. IP doesn’t know the hardware address of the destination device. which protocol can be used to discover the MAC address?

DHCP
BOOTP
DNS
ARP

when a frame enters a port, the source MAC address is copied from the frame header
how do switches and bridges learn where devices are located on a network?
it connects multiple cable segments or devices, and it forwards frames to the appropriate segment
describe the switch functions
send the frame out ports 2-8
an 8 port switch received a frame on port number 1. the frame is addressed to an unknown device. what will the switch do?
it demodulates analog data from a telephone network into digital pc
how does a modem work (demodulate)
it modulates digital data from the PC into analog data and transmits it on a telephone network
how does a modem work (modulate)
fiber optic
what network type uses light pulses to transmit data
greater resistance to interference
what is a major benefit of STP over UTP?
RJ-11
what kind of connector do you use to connect a modem to a standard telephone line?
F-Type
you have a broadband home internet server that uses coaxial cable. Which connector type will you most likely use?
crimper
which tool should you use to attach an RJ-45 connector to the end of a Cat 6 UTP cable?
greater cable distances w/out a repeater.

immunity to electromagnetic interference

what are 2 advantages of using fiber optic cabling for a network, as opposed to other types of cabling?
Green with white
you are using a crimpter to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?
plenum
you are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?
RJ-45
which connector is used w/ UTP cable?
it uses two concentric metallic conductors and it has a conductor made from copper in the center of the cable
which are characteristics of coaxial network cable?
Category 6 UTP and Category 5 UTP
which 2 types of cabling could be used for an ethernet 100BaseT
streaming video
which of the following applications is more likely to justify the investment in Category cable?
streaming video
printing
instant messaging
e-mail
punchdown tool
you need to connect the end of a Cat 6 UTP cable to a 110 punch down block. Which tool should you use?
the network uses half-duplex communications
you have an ethernet network using a the 10Base-T standard. Network devices are connected together using hubs. What is true about the network?
the network operates at 10 mbps, and max cable distance is 100 meters
10Base-T standard speed and cabling
the network operates at 1 gbps and the network uses copper UTP cables
1000Base-T standard speed and cabling
100 meters
for 1000Base-T standard what is the maximum cable length allowed?
2.2.2.2 and 172.16.1.26
which of the following is a valid IP address?

192.168.1.512
254.7.1.417
2.2.2.2
1.254.0.1024
172.16.1.26
256.0.0.1

223.16.5.0, 192.15.5.55, 222.55.0.0
which 3 IP addresses are class C addresses

125.166.11.0
223.16.5.0
189.189.5.2
192.15.5.55
240.0.0.0
222.55.0.0

1-126
class a ranges
128-191
class b ranges
192-223
class c ranges
224-240
class d ranges
241-255
class e ranges
the class defines the default network address portion of the IP address
describe an IP address class
255.255.255.0
what is the default subnet mask for the Ip address 203.111.3.3
190.65.2.0, 132.12.0.0, 129.0.0.0
which of the following IP addresses are class B?

190.65.2.0
132.12.0.0
64.2.2.64
195.155.0.0
129.0.0.0
224.15.55.2
115.33.0.0

114.122.66.12
114.58.12.0
114.0.0.15
which of the following IP addresses belong to the Class A network 114.0.0.0?

115.0.0.66
115.88.0.55
114.122.66.12
114.58.12.0
115.77.89
114.0.0.15

hosts file and DNS
which mechanisms could you use to resolve a hostname into its associated IP address?
Computer, Network, Windows Explorer
Which tool in Windows would you use to browse all networks and shared folders to which a user has access?

Computer
Network
Windows Neighborhood
Windows Explorer
Device Manager
Computer Management

A workstation must request addressing information from a DHCP server and… It can deliver a DNS server address in addition to the host IP address
True statements the Dynamic Host Configuration Protocol (DHCP)
Install the DHCP service on your server
You are setting up a small network in your office w/ one Windows server and 50 Windows workstations. You want to spend as little time as possible configuration the workstations with IP addressing information. What should you do?
DHCP
Which service can you use on your network to automatically assign IP address to hosts and to help prevent the same address from being assigned to two different hosts?
Default gateway
Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?
Network and Sharing Center
Which tool would you use in Windows Vista/7 to manage network connections?
169.254…
Which of the following IP address ranges is reserved for Automatic Private IP Addressing?
191.168.2.15
129.0.0.1
168.16.5.1
Which of the following IP addresses have a default subnet mask of 255.255.0.0?

191.168.2.15
129.0.0.1
228.62.18.6
123.254.19.6
1.6.45.254
168.16.5.1

hexidecimal numbers, 32 numbers, grouped using colons
most common format for expressing IPv6 addresses?
128-bit address, eight hexadecimal quartets
which of the following describes an !Pv6 address?
FEC0::AB:9007
Which of the following is a valid IPv6 address?

FEC0::AB:9007

FEC0:AB04:899A

FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A

199.12.254.11

FEC0:AB98::A7::9845:4567

POP3
Which of the following protocols do e-mail clients use to download messages from a remote mail server?
NetBIOS
Which of the following protocols is non-routable and requires another protocol to enable internetwork communication?
IP
You want to use your Windows workstations to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this?
SMTP
What protocol is used to send e-mail messages from a mail client to a mail server?
FTP
You want to allow your users to download files from server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?
53
you’ve just installed the DNS service on a Windows server. Which port must be opened in the server’s firewall to allow clients to access the service?

110
142
123
53

UDP
You are a software developer and you are creating a multimedia streaming application. Data will be streamed from your steaming server to streaming to streaming clients over IP network. Which transport protocol should your application use to send data between the clients and the server?
3389
You’ve enabled Remote Desktop on a Windows workstation. Which port must be opened in the server’s firewall to allow remote clients to access the desktop?

53
3389
110
123

HTTP
Which IP protocol is used by Web browsers and Web servers to exchange files?

HTTP
HTML
SSL
SMTP

HTTP and HTTPS
Which protocols are used on the Internet to transmit Web pages from Web servers to Web browsers running on client workstations?
DNS
You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?
IMAP
Which of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives user the option to keep mail messages on the server?
encryption
What feature is supplied by WPA2 on a wireless network?
SSID
What of the following is used on a wireless network to identify the network name?
MAC address filtering
Which of the following features on wireless network allows or rejects client connections based on the hardware address?
Backwards compatible with 802.11b devices.

Operates in 2.4 GHz range

Maximum bandwidth of 54 Mbps

Which of the following are characteristics of the 802.11g wireless standard.
802.11n
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
disable SSID broadcast
Which of the following measures will make your wireless network less visible to the casual attacker performing war driving?
802.11g and 802.11a
Which IEEE wireless standards specify transmission speeds up to 54 mbps?
802.11a
Which wireless standard operates at up to 54 Mbps to a maximum of 150 feet?
WPA and WEP
Which of the following are security protocols for wireless networks?
Correct WEP key
On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?
11 Mbps
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
Ad-hoc
what type configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?
Wireless clients must use a static IP address w/in the correct IP address range to connect to the network?
what would clients use when the DHCP setting is disabled in a wireless network?
100 M
What is the maximum range of the Bluetooth 2.0 specification for Class 1 devices?
3 Mbps
What is the maximum transmission speed for Bluetooth devices?
Wireless Ethernet and Bluetooth
You want to use a wireless printer at home. The printer will be used by two computers in two different rooms. Which interfaces could be used to do this?
Bluetooth and WiFi
You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. What would be the best choice?
Modem
To access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?
F-type connectors and RG-6 coaxial cable
Which of the following are used to connect a cable modem to the Internet connection?
copper telephone wire
Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?
RJ-11 and Filters or splitters
you are configuring a ADSL connection. Which of the following will be part of the configuration?
On connections leading to an analog phone
when configuring an ADSL installation, where should you install the DSL filters?
dial-up connection, two data channels, and one control channel
Which 3 are features of Basic Rate ISDN (BRI)?
2 data channels
up to 24 data channels
three control channels
dial-up connection
always on connection
one control channel
ISDN
What network technology is packaged as part of a BRI plan?
Update the firmware
You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the router.
Disable the DHCP on the AP // Confgure the AP to filter out unauthorized MAC addresses
If radio signals extend outside a building and concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network?
Backup generators and cordless phones
Which (2) locations will contribute to the greatest amt of interference for a wireless access point?
to translate between Internet IP addresses and the IP addresses on your private network.
What is a good reason to enable NAT?
near a window
Where is the least secure place to locate the access point when creating a wireless network?
172.18.188.67
10.0.12.15
192.168.12.253
You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer?

32.188.99.10
127.0.0.1
224.15.166.12
172.18.188.67
10.0.12.15
192.168.12.253
240.12.188,1

So multiple computers can share the single IP address used on the internet.
What is the point of enabling NAT?
169.254.0.1 – 169.254.255.254
What is not a range of IP addresses defined in RFC 1918 that are commonly used behind a NAT server
ipconfig / release
Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?
SSH and Telnet
What 2 tools allow for the remote management of servers?
tracert
You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?
-t
while troubleshooting a network connection, you decide to use the ping command. Which switch allows for a continuous ping?
netstat
Which utility would you use to view current connections and active sessions and ports on a computer?
ipconfig/all
Which command would you use to view the MAC address of the network?
ipconfig/renew
Which command would you use to request new IP configuration information from a DHCP server?
ping and traceroute
Which commands can you use to test network connectivity between your workstation and the server?
nslookup
which command produced this output?
nslookup
a user having problems connecting to other computers using host names. Which of the following commands will help you troubleshoot this problem?
ping -l
you suspect large packets are being dropped on your network because of their large size. Which utility can you use to confirm your suspicion?
home group
You have a Windows 7 computer connected to a small network that is not part of a domain. You want to see the computers and printers on the network. What feature do you use?