click below
click below
Normal Size Small Size show me how
Network +
Network + Certification
Question | Answer |
---|---|
Class A (IP Range) | 1-126 |
Class B (IP Range) | 128-191 |
Class C (IP Range) | 192-223 |
What IP is never used? (First Octet) | 127 |
When there's a collision on a Ethernet Segment which ethernet feuature is used to set off a Random Back Off Timer? | CSMA/CD (Carrier Sense Mulitple Access with Collision Detection) |
What is IEEE 802.3 technology? | Ethernet |
Define Collision in regard to Ethernet? | When two devices on a segment transmit data simultaneously |
Which device receives the Broadcast Transmission? | All the devicse on the Ethernet Segment |
Which ethernet technology can logically bond several physical ethernet links into one logical connection? | LACP (Link Aggregation Control Protocol) |
What is IEEE 802.3ad | A protocol that can bond several physical ethernet link into one logical connection. Like LACP |
Which two Wireless Standards are compatible with each other? | 802.11b and 802.11g (because they operate on the 2.4 GHz frequency) The difference is the Data Transfer Speeds |
Which wirless standard offers 600 Mbps of Data Transmission and supports both 2.4 Ghz and 5 Ghz bands? | 802.11n |
Which mechanism is used to prevent collisions in a wireless domain? | CSMA/CA |
PSTN (Public Switched Telephone Network) is what type of network? | Circuit Switched |
When trying to identify a port on a host or network which tool would you use? | Port Scanner |
Class A Private Address Range | 10.0.0.0- 10.255.255.255 |
Class B Private Address Range | 172.16.0.0- 172.31.255.255 |
Class C Private Address Range | 192.168.0.0- 192.168.255.255 |
Which wireless standard intorduced channel-bonding? | 802.11n that is why it can reach 600 Mbps (300 Mbps per radio) |
What cabling is immune to EMI (Electro Magnetic Interference) | Fiber Optic |
FC (Fixed Connection) is what type of connector? | Fiber Optic, Screw-On |
What is IDS | Intrusion Detection System |
What is attenuation in cabling? | Process where an electric signal loses strength as it is being transmitted across a medium |
What characters are valid in a hexadecimal? | 0-9 and A-F |
Which tool can be used to obtain NetBIOS over TCP/IP statistics? | nbstat |
Which is more Intellegent IPS (Intrusion Prevention System) or IDS (Intrusion Detection System) | IPS (Intrusion Detection System) |
Which type of connector has a 5 mm ferrule? | MT-RJ (Mechanical Transfer-Registered Jack) |
Features of EAP-TLS | Most secure method used in remote access on windows. |
Peer-to-Peer is which type of logical network topology? | A Workgroup |
What makes L2TP the most secure way to implement a VPN tunnel? | It is implemented with IPSec (IP Security) |
What kind of Routing is RIP (Routing Information Protocol) | Dynamic Routing |
Difference between IMAP4,POP3, and SMTP | IMAP4 and POP3 are used to retrieve email from the internet. SMTP is used to push out email. |
Features of Multilayer Switch | -Combined functionality of Layer 2, Layer 3, and Layer 4 switching -High-Speed scalability -Low Latency |
What is supernetting | A network that has repurposed network bits to extend the maximum number of hosts for a subnet. When the subnet mask is lower that the IP class default. |
What two protocols are capable of sending firmware updates to routers and booting network devices? | TFTP (Trivial File Transfer Protocol) and FTP (File Transfer Protocol) |
What is the sequence that describes the parts of large network from the demarcation point to the client computers? | Smartjack, MDF, IDF, Clients |
Max transfer speed of an E3 link | 34.368 Mb/s |
Which routing protocol is Cisco proprietary and classified as a balanced hybrid routing protocol? | EIGRP (Enhanced Interior Gateway Routing Protocol) |
what operating system uses ifconfig | Linux/ Unix system |
QoS traffic shaping is best used for what type of traffic? | Streaming Video |
What tool measures resistance and voltage? | Multimeter |
a domain is what type of network? | client/ server |
What can protect a PC from a Remote Desktop Brute Force Attack? | Setting an account lockout policy |
What is the APIPA ip range? | 169.254.0. - 169.254.255.255 |
what does the command nslookup do | It query's the DNS server |
IGRP and RIP use what type of algorithm? | Distance-Vector |
What network device can connect two networks that use different protocols? | Gateway |
Straight Through cable uses what standard of wiring at both ends? | T568A |
10GBase T Ethernet avoids collisions how | data is transmitted and received on separate wires |
What device allows for conversion of media types? | Media Converter |
What type of firewall blocks traffic based on port number? | Packet-Filtering firewall |
With what tool can you check were a cable terminates | Fox and Hound Tool |
Can collisions occur on a full duplex switch. | NO, receiving and sending are transmitted through different wires |
Polymorphism does what to a virus? | enables the virus to change specific aspects of itself when it replicates |
How many hosts can 10Base-T network support? | 1,024 Hosts |