How can we help?

You can also find more resources in our Help Center.

Networking Essentials Final Exam

STUDY
PLAY
Which of the following is one of the basic functions a computer performs?
Processing, Input, Output
The ____ executes instructions provided by computer programs.
CPU
When a CPU is composed of two or more processors, each one is referred to as a(n) ______.
Core
Which of the following is considered long-term storage?
Flash drive, Hard drive
Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?
Chipset
You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have?
PCI-Express
The time it takes for read/write heads to move to the correct spot on the platter is the _______.
Rotational Delay
Which of the following is a task usually performed by the BIOS?
Perform a POST, Begin the boot procedure
Place the following steps of the boot procedure in order:
Power is applied, CPU starts, The POST is executed, Boot devices are searched, The OS is loaded into RAM.
Which of the following is a critical service provided by the OS?
Memory management, File system
An OS's capability to run more than one application or process at the same time is referred to which of the following?
Multitasking
You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?
Device driver
Which of the following requests information stored on another computer?
Network client
Choose the correct order for the process of a user attempting to access network resources:
Application, Network client, Network protocol, NIC driver
TCP/IP is an example of which of the following?
Network protocol
In network communication, the _______ address is used to deliver a frame to the correct computer on the network.
MAC, Physical
A(n) _________ message is used to determine whether a computer is listening on a network.
Ping
TCP/IP uses _____ to look up a computer's IP address, given its name.
DNS
The unit of information containing MAC addresses and an error-checking code that's processed by the network interface layer is referred to as a _____.
Frame
Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?
Encapsulation
You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?
Internetwork
Which of the following best describes a client?
A computer's primary role in the network is to run user applications and access network resources.
You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install?
Peer-to-peer network
Which of the following characteristics is associated with a peer-to-peer network?
Decentralized data storage, Inexpensive, User-managed resources
A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?
LAN
At Yavapai College, the Prescott and Prescott Valley campuses (8 mile apart) have LANs connected via the local phone company. This configuration is an example of which of the following?
MAN
You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?
Directory services
Peer-to-peer networks aren't suitable in which of the following situations?
Tight security is required
Which of the following best describes a storage area network?
Uses high-speed networking technologies to give servers fast access to large amounts of disk storage.
Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008?
They include a directory service and a naming service.
Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers?
...
Which of the following is true of a repeater?
...
Which of the following is true of a hub?
...
Which of the following is the unit of measurement by which a hub's bandwidth is usually specified?
...
Which of the following describes how devices connected to a hub use the speed at which the hub can transmit data?
...
Which of the following is a likely indicator light on a hub?
...
Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data?
...
What does a switch use to create its switching table?
...
What purpose does the timestamp serve in a switching table?
...
What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch?
...
To which device is a wireless access point most similar in how it operates?
...
What's the purpose of an RTS signal in wireless networking?
...
Which of the following is a common operational speed of a wireless network?
...
Which of the following is a task performed by a NIC and its driver?
...
Which of the following best describes a MAC address?
...
Under which circumstances does a NIC allow inbound communications to pass through the interface?
...
How does a protocol analyzer capture all frames?
...
In Windows 7, which of the following displays information about currently installed NICs?
...
Which of the following is the purpose of an SSID?
...
Which of the following describe the function of routers?
...
What information is found in a routing table?
...
You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with each other in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do?
...
Review the routing table in Figure 2-29. Based on this figure, where will the router send a packet with the source network number 1.0 and the destination network number 3.0?
...
If a router receives a packet with a destination network address unknown to the router, what will the router do?
...
Which of the following is true about routers?
...
Which of the following describes the arrangement of network cabling between devices?
...
Which of the following is an advantage of a star topology?
...
Which of the following is an example of a technology using a physical ring topology?
...
Which technology is likely to be implemented as a point-to-point physical topology?
...
Which of the following describes a hub-based Ethernet network?
...
Which of the following is a characteristic of a logical ring topology?
...
Which best describes a typical wireless LAN?
...
Which of the following is a characteristic of a switched logical topology?
...
Which of the following is a characteristic of unshielded twisted-pair cabling?
...
Which of the following is a characteristic of fiber-optic cabling?
...
Which topology most likely uses coaxial cabling?
...
Which of the following is true of a MAC address?
...
Which of the following is the most commonly used Ethernet frame type?
...
Which access method uses a "listen before sending" strategy?
...
Which of the following is a field of the most common Ethernet frame type?
...
Which of the following is true about full-duplex Ethernet?
...
Which of the following is defined by the extent to which signals in an Ethernet bus topology network are propagated?
...
Which of the following is considered a property of Ethernet?
...
Which of the following is true of IEEE 802.3an?
...
Which of the following is a feature of 100BaseFX?
...
Which Wi-Fi standard can provide the highest bandwidth?
...
Which of the following is true about infrastructure mode in wireless networks?
...
How many channels can be used on an 802.11b network in North America?
...
Which media access method does Wi-Fi use?
...
Which of the following is true about the token ring technology?
...
Which of the following is a common characteristic of a networking medium?
...
Which of the following types of fiber-optic connectors provides high density and requires only one connector for two cables?
...
Which of the following conditions requires cables not to exceed a recommended maximum length?
...
Which of the following is the process for representing bit signals on the medium?
...
What happens to signals as they travel the length of the medium?
...
Which of the following is UTP susceptible to?
...
The space between a false ceiling and the true ceiling where heating and cooling air circulates is called the _____.
...
What type of connector is used most commonly with TP network wiring?
...
You have been hired to install a network at a large government agency that wants to reduce the likelyhood of electronic eavesdropping on its network. What type of cable is most resistant to eavesdropping?
...
Which of the following is a characteristic of unshielded twisted-pair cable?
...
Which of the following is a characteristic of fiber-optic cabling?
...
You're preparing to install a conventional Ethernet network in your new office building, but your boss tells you to be ready to handle a switchover to 1 Gbps Ethernet next year. What types of cable could you install?
...
When two cables run side by side, signals traveling down one wire might interfere with signals traveling on the other wire. What is this phenomenon called?
...
What characteristic of twisted-pair cabling helps mitigate the effects of crosstalk?
...
What is the wireless device used to link buildings without cable?
...
Which of the following is a wiring standard for twisted-pair cable connections?
...
Which of the following is a component of a structured cabling system?
...
Where are you most likely to find vertical cabling?
...
Which of the following is a tool needed to make a patch cable?
...
Which type of connection is most likely to require a crossover cable?
...
Which UTP limitations can be solved by fiber-optic cable?
...
How many strands of fiber-optic cable are needed for a network connection?
...
Which statement is true about fiber optic cables?
...
Which type of wireless network requires a clear line of sight between transmitter and receiver?
...
Which of the following wireless technologies does a 802.11 wireless network using the 2.4 GHz frequency range use?
...
An IPv6 address is made up of how many bits?
128
The subnet mask of an IP address does which of the following?
Defines network and host portions of an IP address
If a protocol is routable, which TCP/IP layer does it operate at?
Internetwork
Which of the following is a private IP address and can't be routed across the Internet?
172.19.243.254
Which TCP/IP model layer takes a large chunk of data from the Application layer and breaks it into smaller segments?
Transport
Which of the following protocols resolves logical addresses to physical addresses?
ARP
Which of the following protocols provides connectionless service?
UDP, TCP
If you want to design an Application-layer protocol that provides fast, efficient communication and doesn't work with large amounts of data, what Transport-layer protocol would you design it to use?
UDP
Which of the following is the term for identifying packets used by TCP to establish a connection?
Three-way handshake
What is the term for each grouping of 8 bits in an IP address?
Octet
When using TCP/IP, which of the following must computers on the same logical network have in common?
Subnet mask
Which of the following IPv6 features is an enhancement to IPv4?
Larger address space, Built-in security
Which protocol can configure a computer's IP address and subnet mask automatically?
DHCP
How many bits must be reallocated from host ID to network ID to create 16 subnets?
4
For the class C network address 192.168.10.0, which of the following subnet masks provides 32 subnets?
255.255.255.248
How many host bits are necessary to assign addresses to 62 hosts?
6
Which IP addressing process enables workstations to use private IP addresses to access the Internet?
NAT
When a Windows computer is configured to use DHCP but no DHCP server is available, what type of address is configured automatically for it?
APIPA
Which of the following represents a valid IPv6 address?
2001:345:abcd::BEEF:44
Which of the following is a reason to subnet?
Networks can be divided into logical groups, Subnetting can decrease the size of broadcast domains
Which of the following Application-layer protocols typically uses the UDP Transport-layer protocol?
DNS, DHCP
Which is the correct order of headers, from left to right, in a completed frame?
Frame, IP, UDP
Which of the following is a task performed by the Network access layer?
Verifies that incoming frames have the correct destination MAC address, Transmits and receives bit signals
What field of the IP header does the Tracert program use to get the IP address of routers in the path?
TTL
Which of the following is not found in a connectionless Transport-layer protocol?
Three-way handshake, Acknowledgements
The original commercial version of Ethernet supported 10 Mbps bandwidth; the version introduced in the early 1990s supports 100 Mbps; and in 1998, Gigabit Ethernet was introduced. All version use the same data frame formats, with the same maximum PDU sizes, so they can interoperate freely. Given this information and what you know of layered technologies, which of the following statements is true?
Ethernet works at the Data Link and Physical layers of the OSI model, and upgrades to newer, faster versions of Ethernet can be made by changing only the components that work at these layers, Changes in technology at one layer of the OSI model don't usually affect the operation of other layers.
The addition of information to a PDU as it's passed from one layer to the next is called which of the following?
Encapsulation
Layers acting as though they communicate directly with each other across the network are called which of the following?
Peers
Place the following letters in the correct order to represent the OSI model from Layer 7 to Layer 1:
Application, Presentation, Session, Transport, Network, Data Link, Physical
Which OSI layer creates and processes frames?
Data Link
Which OSI layer handles flow control, data segmentation, and reliability?
Transport
Which OSI layer governs how a NIC is attached to the network medium?
Physical
Which OSI layer determines the route a packet takes from sender to receiver?
3
Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network?
5
Which of the following elements might the Data Link layer add to its PDU?
Physical addresses, CRC
When and how many times is a CRC calculated?
At the source and destination and at each intermediary device
Which layer of the OSI model does Project 802 divide into two sublayers?
Data Link
What and the names of the sublayers specified as part of Project 802 ?
Logical Link Control (LLC), Media Access Control (MAC)
Which term refers to stripping header information as a PDU is passed from one layer to a higher layer?
Deencapsulation
Which IEEE 802 standard applies to Ethernet?
802.3
Which IEEE 802 standard applies to wireless LANs?
802.11
What is the name of the PDU at the Transport layer?
Segment
At which OSI layer does the PDU contain sequence and acknowledgement numbers?
4
Which of the following is an example of software found at the Application layer?
FTP, HTTP
At which Data Link sublayer does the physical address reside?
Media Access Control (MAC)
Which of the following problems can occur at the Physical layer?
Signal errors caused by noise
When a switch receives a frame on a port and floods the frame, what does it do with the frame?
Forwards it out all other connected ports
You have two eight-port switches. On each switch, seven stations are connected to ports, and the two switches and connected with the eighth port. How many collision domains are there?
16
Which of the following is considered a Layer 2 device?
Switch
You just purchased some new switches for your company's network. Your junior technicians are doing most of the work connecting switches to workstations and to each other, and you don't want to confuse them by requiring them to use both patch cables and crossover cables. How can you test the switches to determine whether you need both types of cable, and what's the using only one type of cable for all connections?
Connect two switches by using a patch cable. If the connection works, the switch supports auto-MDIX.
What feature of a switch keeps switching table entries from becoming stale?
Aging time
Which is the fastest switching method?
Cut-through
There can be only one MAC address per port in a switching table.
False
What does it mean if the first 24 bits of a MAC address are 01:00:5E?
It's a multicast frame
What feature should you look for in switches if your network is cabled like the one in Figure 7-16?
STP
What should you configure on a switch that's connected to three broadcast domains?
VLANs
Which of the following is a Layer 3 device?
Router
What does a router do after receiving a frame on one of its interfaces?
Deencapsulates the frame to create the packet, Encapsulates the packet to create a new frame
Which of the following is found in a routing table?
Metric, Next hop
Which of the following accurately describes a distance-vector routing protocol?
It learns from its neighbors
Which of the following is a characteristic of routing protocols?
Network changes are reflected in the routing table automatically, The add routing table entries dynamically
Which of the following is the best routing solution for a network that includes redundant links?
OSPF
If you don't want wireless clients to view the name of your wireless network, what feature should you use?
Disabling SSID broadcasts
To prevent a wardriver from being able to interpreter captured wireless network data, you should enable which of the following?
WPA or WPA2
What feature can you use to wirelessly connect the wired networks in two buildings?
Bridge mode
Which AP feature is useful when you have many guests accessing your network and you don't want them to be able to access the computers of other guests?
AP isolation
Which PC bus uses up to 32 lanes to achieve very high data transfer rates?
PCIe
Which PC bus allows you to connect a NIC to your computer easily without powering off?
USB
Which NIC feature do you need to configure on a thin client?
PXE
Which device is used to communicate between broadcast domains?
Switch with VLANs
What feature should you configure to prevent users on one subnet from accessing the Web server on another subnet?
Access control lists
Which of the following is an objective of a file system?
Organize space on a drive, Organize files hierarchically, Secure access to files
A cluster is composed of which of the following?
One or more 512-byte sectors
Large cluster sizes can result in which of the following on a disk drive?
Faster performance for large files, more wasted space for small files
Which of these file systems includes file and folder permissions?
Ext3, NTFS, Ext2
What feature of a file system makes it possible to find a file based on keywords in it?
Indexing
Which of the following is best described as a program loaded into memory that has no user interface but communicates with other programs?
Process
The DNS function is built into most applications.
False
Which best describes context switching?
The OS suspending the running process and activating another process
The most common form of multitasking in current OSs is cooperative multitasking.
False
The OS component that schedules processes to run is the _______.
Kernel
Which best describes a thread?
The smallest schedulable unit of software
Which answer shows the correct order of DHCP packets generated when a computer requests a new address lease?
DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck
If you want a computer to query DNS by appending more than one domain name to the computer name, which of the following should you configure?
Additional DNS servers
Which port does you Web browser use to communicate securely with the Web server by using SSL?
443
Why should you set the "Register this connection's addresses in DNS" option?
So the the computer's name and address are added to the DNS database automatically
Which is the correct syntax for mapping drive letter W to a shared folder named Accounting on the Finance server?
net use W: \\Finance\Accounting
A text file containing a list of commands is called which of the following?
Batch file
The default protocol Windows uses to share folders is which of the following?
SMB
Which of the following refers to a Windows server with Active Directory installed?
Domain controller
Which of the following best describes an NAS?
A dedicated device designed to provide shared storage for network users
Which of the following is an element of a DNS server?
Zone, Root hints
If you want one server to take over the processing of a server that has failed, what should you configure?
Failover cluster
Software that creates and monitors the virtual hardware environment is called what?
Hypervisor
Bare-metal virtualization is best for desktop virtualization.
False
If you want your virtual machine to have direct access to the physical network, which virtual network option should you configure?
Bridged
Which of the following is a function of a user account?
Provides a method for user authentication, Provides a method for user authentication, Authorizes a user to log on to network servers
Which of the following is true of group accounts?
They organize users for easier assignments of resource permissions
Which of the following is true of a user logon name in Windows?
It's not case sensative
Which of the following is a group scope in Active Directory?
Domain local, Global
Which of the following is a default group in Active Directory?
Backup operators, Server operators
Which of the following is a special identity group?
Everyone, Authenticated Users, Creator Owner
Which of the following is a collection of a user's personal data folders and application settings that's available at any computer where the user logs on?
Roaming profile
Which command in Linux might be needed to perform user account management if you aren't logged on as the root user?
sudo
Which command in Linux gives you extensive help on how to use a command?
man
Which is true about Linux user accounts?
They must belong to at least one group, The account names are case sensative
Which is true about partitions?
You can have up to four primary partitions, Only a primary partition can be active
Which file system supports a maximum file size of 2 GB?
FAT16
Which NTFS feature should you configure if you want users to be able to revert to an older version of the file?
Shadow copies
Which is true about file compression?
A compressed file can't be encrypted with EFS, Decompression occurs automatically when a file is accessed
Which of the following is true about permissions in NTFS?
By default, permissions are inherited automatically from the parent folder
Which of the following is a permission in the Linux OS?
Read, Execute
Which of the following correctly describes how sharing and NTFS permissions work?
When a file is accessed over the network, sharing permissions are checked first.
Which of the following is true of Windows printing terminology?
A print server is a computer sharing a printer, A print queue stores jobs waiting to be printed
Which of the following tools is used to view information categorized as Information, Warning, or Error?
Event Viewer
Which is best described as a record of performance data gathered when a system is performing well under normal conditions?
Baseline
Why would you choose to monitor a system's performance remotely?
You want to lessen the impact of the monitoring session on the computer.
Which is true about Windows Backup in Windows Server 2008 R2?
Backups can be stored on network devices, The Volume Shadow Copy Service backs up open files, You can back up another computer remotely.
Which UPS type is best for computer power backup?
Online
Which RAID level uses a minimum of three disks and provides fault tolerance?
RAID 5
Your friend creates a shared folder on her computer for several coworkers to use. She assigns the password "0OxqH}ml2-wO" to the folder. Is it an example of a good password or a bad password?
Bad, it's overly complicated and forgettable.
List at least three techniques you can use to help secure a wireless network.
Hide SSID, MAC Address Filtering, WEP/WPA encryption
Which of these protocols is used for VPNs?
PPTP, SSTP, L2TP
How do VPNs accomplish the "private" part of a virtual private network?
Encryption within encapsulation
Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets so that the server can't respond to normal traffic?
DoS
Which of the following is a guideline for creating a security policy?
A security policy should be enforcable.
Which of the following is a component of a security policy?
Authentication policy, Privacy policy
List two questions that must be answered before determining what level of security a network requires:
Protect what? From who?
Choose two words from the following list that best complete this sentence: If there's ___ access to the equipment, there's no _____.
Physical, Security
Which of the following is a requirement for rooms housing network servers?
Adequate cooling
Which of the following should be a common element in any level of security policy?
Backup procedures, Virus protection
The procedure that specifies what resources users can access and the tasks they can perform on a network is referred to as which of the following?
Authorization
If you want to allow a blank password in a Windows 7 system, which of the following do you set the password minimum length to?
0
If you want to prevent password guessing to foil intruders, you should enable which of the following?
Account lockout
Which of the following is a secure method of storing passwords on a Linux system?
Shadow passwords
Which of the following is a good password?
L0sT!n@Z
Which of the following is a method IPSec uses to authenticate the identity of communicating devices?
Kerberos, Digital certificates
To encrypt data stored on a hard drive on a Windows Server 2003 computer, you should use which of the following?
EFS
Firewalls can filter packets based on which of the following?
Source address, Protocol, Context
If network administrators want to be informed when an attempt has been made to compromise the network, what should they use?
IDS
Which of the following is one of the most important aspects of supporting a small business?
Listening to the company's requirements and designing a solution.
Which of the following is a possible problem with a peer-to-peer network solution?
Users can unknowingly sever access to shared files or printers, Sensitive data could be made available to unauthorized users.
Which of the following is true of the HomeGroup feature?
Homegroups are password-protected
Which is true about sharing files in a Windows domain?
All computers except the server are workgroup members.
Which of the following is true about NAS?
It usually has its own user interface, Users and groups can be created on an NAS
Which is true about Windows SBS?
It includes an email server, It provides intranet functionality
Which of the following is true about using Linux as a desktop OS?
Office applications are available that are compatible with Microsoft Office, Virtualization can be used to run Windows applications
A domain controller simplifies resource management by doing what?
Centralizing accounts
What are the most common options for sharing files in a Linux environment?
NFS, Samba
Which of the following is a common fault-tolerant disk configuration for servers?
RAID 1 for the OS and RAID 5 for the data
Which of the following is a consideration when purchasing a switch?
Switch speed, Support for multiple media types, Whether it's managed or unmanaged
Which of the following is a consideration when selecting wireless network equipment?
Security standards supported, Interference from other wireless devices
To run a Web server on a network protected by a SOHO router, you must enable what feature?
Port forwarding
Which of the following is a VPN mode?
Gateway-to-gateway, Client-to-gateway
What legal document should be read carefully before purchasing software for multiple users to run?
EULA
Which of the following describes the cost of a product when intangibles are factored in?
TCO
Which network remote access method provides a secure connection over the Internet?
VPN
Which of the following is a feature a firewall router provides?
Protection against DoS attacks, Web site filtering, Cookie blocking, Protection against IP spoofing
In which of the following areas does a WAN differ from an internetwork?
WANs use service providers for the network connection, WANs use serial communication technologies that can span miles
Which of the following is a device used to make WAN connections?
CSU/DSU, Router
Which of the following best describes a digital signal?
A series of binary values
For what purpose is a CSU/DSU used?
Creates a WAN connection over the public switched telephone network
Which of the following is a common WAN connection method?
Circuit switched, Packet switched
Which of the following is true about ISDN?
It uses a terminal adapter to connect to the network?
Which of the following is a typical situation in which leased lines should be considered?
24/7 access is required, Fast upstream and downstream communications are needed
Which of the following combines several communication streams into a single faster communication stream?
Multiplexing
Which physical topology does SONET readily support?
Point-to-point, Star, Ring
Which of the following technologies uses packet-switching?
Frame relay, X.25
Which of the following technologies provides permanent virtual circuits?
Frame relay, X.25
Which technology uses 53-byte cells?
ATM
To maintain security, WAN connections over the Internet should use which of the following?
VPN
What type of device is required to connect to a dedicated digital communication line?
CSU/DSU
Which term best describes the place in a WAN connection where the customer's responsibility ends and the provider's responsibility begins?
Demarcation point
Which of the following places data on the local loop?
DCE
Which of the following is the equipment at the customer site that's the responsibility of the customer?
CPE
Which of the following is a VPN protocol supported by RRAS?
PPTP, L2TP, SSTP
Which of the following is a component of the PPP protocol?
Link Control Protocol, NCP
Which of the following can best be described as developing applications by using a service provider's development tools and infrastructure?
Hosted platforms
A ________ can determine whether a cable break or short exists and approximately how far down the cable it's located.
Time-domain reflectometer
At what layer of the OSI model is a CRC error detected?
Data Link
Which type of plan makes returning a network to its state before an upgrade easier?
Rollback plan
Based on the eight-step problem-solving process discussed in this chapter, what's the first step in network troubleshooting?
Determine the problem definition and scope
Which problem-solving approach requires a solid understanding of how networks work?
Step by step with the OSI model
Under which condition is using the trial-and-error approach not advisable?
A server or network device is live on the network, You can't undo changes easily
Which layer is where problems restricted to one workstation are likely to occur?
Physical
After implementing a solution, what's the next step?
Test the solution
Which of the following can be used to prevent data loss during a power fluctuation or failure?
UPS
Which of the following is an element of the information-gathering step in the problem-solving process?
Find out whether the function ever worked, Determine whether something has changed, Compare current operation with a baseline
When measuring network performance, what do you need as a point of reference?
Baseline
Which of the following is the TCP/IP protocol used to configure and monitor network resources?
SNMP
A logical topology includes jack locations and room numbers.
False
What is an advanced network-monitoring protocol with more capabilities than SNMP?
RMON
For which of the following network conditions must you use a protocol analyzer or network monitor for further diagnosis?
Slow network performance, High rate of transmission errors
At what layers of the OSI model does a software protocol analyzer operate?
Layers 2 to 7
Which of the following is not found in the output of a successful Ping reply?
The sequence number
Which documentation section describes the physical layout of network media?
Cable plant
When using the Ping program to solve a network connection problem, which of these steps can you skip in the target host is on the same LAN?
Ping the default gateway