Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

What is the Ethernet frame type that is used by TCP/IP?

Ethernet II

When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?


TCP establishes a connection with the destination device using which process?

three-way handshake

What type of wireless technology is used for 802.11b /g /n networks?

spread-spectrum radio

What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand?


When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?


The last 64 bits of an IPv6 address are the interface identifier. Where is that number derived from?

the MAC address

Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control sublayer?

Data Link

You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?


What is the main disadvantage of cable modem networking?

It uses a bus topology.

Each interface on a router must have an IP address and what else to be able to communicate on the network?

MAC address

What is the hexadecimal number F equal to in binary?


What is the best way to eliminate the possibility of collisions in a network?

Both a and c

When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?

100 meters

What is the decimal equivalent to the hexadecimal number D?

4-byte frame check sequence

What is the media access method used by Ethernet?


Which of the following is NOT an advantage of a physical star?

provides redundancy and fault tolerance

What type of logical topology does a Wireless LAN use?

logical bus

What is the decimal equivalent to the hexadecimal number D?


How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits?


When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?

router on a stick

A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?

It's the organizationally unique identifier for the manufacturer of the device.

You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?

peer-to-peer network

What command would you issue from a command prompt to see a listing of the computers in your workgroup?

net view

Which layer is responsible for determining the best path a packet should travel across an internetwork?


What is the main advantage of a point-to-point topology?

data travels on a dedicated link

In wireless networks, what type of media access control is used?


Which of the following is not a form of electromagnetic interference, or EMI?


What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?

structured cabling

Which is the strongest form of wireless security?


Why would you need to use a repeater?

You need to add a group of computers to your network, and the distance is too far for normal means of communication.

Airwaves are an example of what type of network component?

network medium

What is the maximum cable length for both category 5e and category 6 UTP cable?

100 m

When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?

ad hoc

In what layer does the NIC operate?

Network Access

At which layer would you find errors that were caused by EMI?


The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?

demarcation point

Which layer is responsible for the encoding of signals?


Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?


One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called?

access control

You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem?

Network layer device

What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?


The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?


Which of the following connections might require a crossover cable?

switch to switch

When discussing Ethernet standards, what does the XBaseY terminology refer to?

the transmission speed, the type of transmissions, and the length or type of cabling

What type of wiring should be used for a high-speed connection between two buildings?

fiber-optic cabling

How does a switch "learn" MAC addresses?

The switch reads each frame and makes a note of where each MAC address came from.

What does a switch store in its switching table?

the source MAC address of a frame and the port it was received on

A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?


Which of the following is not an Application layer protocol?


What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?

sequence number

When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?


What is a PDU?

It is the name given to the unit of information used by each layer.

What is the purpose of the default route?

It's where the router sends all packets with destinations of which it has no knowledge.

Which of the following is the fastest switching mode?


What component of the computer provides it with a MAC address?


You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address?


In a token ring network, what is the central device called?

multistation access unit

What information would you find in the header of a Transport layer PDU?

window size

In an MDI device, on which two pins does the device use to transmit?

1 and 2

Which layer of the OSI model is responsible for encryption and decryption?


What does the frame trailer consist of in an Ethernet frame?

cyclic redundancy check

Which part of the network communication process is responsible for sending and receiving data to and from the network media?

NIC driver

Which layer is responsible for establishing a connection between the source and destination?


What does it usually mean when the activity light on a switch is blinking?

It is communicating with the network.

Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?

physical ring

What is the IEEE standard governing wireless networking?


A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once.
1—backbone cabling
2—entrance facility
3—equipment room
4—horizontal wiring
5—telecommunications closet
6—work area

2, 1, 3, 1, 5, 4, 6

An IP address consists of four octets separated by periods. Which part of this address denotes its class?

first octet

Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP?


Why is the use of a switch preferred over a hub?

All of the above.

The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?


Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID?

subnet mask

What type of routing protocol are RIP and RIPv2?

distance-vector protocol

Which of the following is not a true statement regarding the function of a switch?

It determines the path used based on the destination IP address.

In Windows, you can start the Task Manager by simply right-clicking the taskbar and choosing Start Task Manager.


What directory service protocol used in Linux systems is also supported by Windows?


What is a partial copy of a VM that is used to restore it to a previous state?


Virtualization is designed for testing and development purposes only.


Which of the following virtualization products provides hosted virtualization?

VMware Workstation

Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task?


What storage solution involves a third-party company that provides off-site hosting of data?

cloud-based storage

One critical difference between a client OS and a server OS is the addition of directory services on some server OSs.


Which of the following is not a function typically provided by the centralized management of a server-based network?

protocol analysis

You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation?


Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?

Datacenter Edition

What are the chunks called into which the available storage space on a disk drive is broken?


When a disk is formatted, it is impossible to recover the data that was on the disk..


smallest unit of software that can be scheduled


a program that is loaded into memory


hypervisor installed in a general-purpose OS

hosted virtualization

the process of granting or denying access to a user


two or more threads being executed simultaneously


partial copy of a virtual machine


identifying who has access to network


creates and monitors the guest operating systems


runs in the background


hypervisor installed directly onto the server

bare-metal virtualization

What method does the CPU use to divide its computing cycles between more than one process?

time slicing

What is the native file-sharing protocol in Linux?


In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?

system monitor

Windows Server 2008 R2 can be installed only on a 64-bit system


If you need to limit the amount of data users can store on a volume, you would implement which of the following?

disk quotas

Windows can be installed on an extended partition that has been formatted with the NTFS file system.


When a file is encrypted, what color does the file name appear in Windows Explorer?


What tool would you use to view error messages that are generated by system services or applications?

Event Viewer

What is RAID level 1 also called?

disk mirroring

You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?

User must change password at next logon.

In Linux, what is the command for viewing a file's contents onscreen?


can be used to create a RAID

dynamic disk

if the primary server fails, the secondary server takes over

failover cluster

can be divided in up to four primary partitions

basic disk

defines a user's environment

local profile

multiple servers acting as a single server

load-balancing cluster

power device that provides fault tolerance through battery backup

power device that provides fault tolerance through battery backup

partition that contains the boot loader

system partition

action that a user can perform on a computer


can be made the active partition

primary partition

can only be divided into logical drives

extended partition

A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.


In regards to a user account, what does a white circle with a black arrow indicate?

The account is disabled.

You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?


Which of the following is NOT a Linux file system?


A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?


What level of RAID does not provide fault tolerance?


The partition that contains the Windows OS files is known as the what type of partition?


How many disks are needed to implement a RAID 1 + 0?


A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?


An event log entry that is an error is marked with a red circle with a white exclamation point in the center.


In Linux, every user that is created automatically belongs to a default group named Users.


Group accounts make it easier for an administrator to manage user rights and permissions.


Where are the waiting print jobs stored until they can be sent to the print device?

print queue

Which of the following should not be a concern when discerning the level of security that is required in a network?

how difficult it would be to enforce a password policy

What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?


What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?


If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?

network policy and access services

What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?


Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.


You don't need to physically secure your servers as long as you use a good strong password for your accounts.


What is a policy that defines the methods involved when a user logs on to the network called?


Which protocol is used to encrypt data as it travels a network?


When using to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?

USB key mode

Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?


A security policy should clearly state the desired rules, even if they cannot be enforced


A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.


A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.


In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.


The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?


Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

preshared key

See more

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording