Study sets, textbooks, questions
Upgrade to remove ads
MTA Networking Fundamentals 98-366
Terms in this set (80)
Automatically maintains routing tables.
One advantage of dynamic routing is that it:
Which of the following represents a Media Access Control (MAC) address?
Network address translation (NAT).
Connecting to a private network address from a public network requires:
A network device that associates a Media Access Control (MAC) address with a port is a:
A Layer 2 device that connects multiple computers within a network is a:
A cable that meets the l000BaseT standard has a maximum length of
A router's static route is set by the:
Which setting is used to determine the Domain Name System (DNS) settings on a client computer?
The default subnet mask for a Class B network is
The default port used for SMTP is
Self-test a host's own network interface & Determine whether a host is reachable.
The ping tool is used to: (Choose two.)
Address reservation & IP address exclusion
Which of the following are features of DHCP? (Choose two.)
The command-line tool used to list a host's active incoming connections is
A computer that has an IP address of 169.254.0.1 cannot access the network.
Which of the following services should you confirm is available?
Which network does the IP address 126.96.36.199 belong to?
Which subnet mask is valid?
Windows Internet Name Service (WINS).
A service that resolves NetBIOS names to IP addresses is:
Host (A) DNS record
What type of DNS record maps hostnames to addresses?
Allows IPv6 connectivity through IPv4 devices.
Teredo tunneling is a protocol that:
What is the default subnet mask for a Class C Internet network?
The default port used for telnet is:
Attempt to obtain a new address by broadcasting.
When a client's DHCP-issued address expires, the client will:
The DNS is not resolving.
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt?
Network interface card (NIC).
A Media Access Control (MAC) address identifies a/an:
Two companies want to share data by using the Internet. Which type of network provides the solution?
A secure connection through public networks.
VPNs are implemented to provide:
Electromagnetic interference (EMI)
If an 802.llg Internet connection has connectivity problems, what may be the cause?
The transmission standard of the equipment used
Which of these factors has the biggest impact on data transmission speed in a wireless network?
Which of the following uses a tunneling protocol?
A network that separates an organization's private network from a public network is a/an:
Which type of network is most vulnerable to intrusion?
Distance from the access point.
Attenuation in a wireless network signal is a result of:
Which type of network covers the broadest area?
Contention & Token passing
In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
In a physical star topology, the central device is referred to as a:
Which technology can you use to extend an internal network across shared or public networks?
802.11g & 802.11n
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
A connection will be established.
What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?
DS3 (T3 Line)
Which technology provides the highest bit rate?
Encrypted connection across the Internet.
A VPN is a/an:
Topology and protocols
Which of the following determines the media access method that is used in a network?
WI-FI Protected Access (WPA)
Which wireless authentication method provides the highest level of security?
Physical and logical characteristics.
The topology of a local area network (LAN) is defined by the:
The maximum throughput of an 802.llg network is:
A node within a local area network (LAN) must have a network interface device and a:
Point-to-Point Protocol (PPP)
Which of the following is a Layer 2 WAN protocol?
Which type of port is used to support VLAN traffic between two switches?
Address Resolution Protocol (ARP).
The protocol that maps IP addresses to a Media Access Control (MAC) address is:
Verify that the DHCP service is available.
A user reports that she cannot connect to network resources from a computer on the company network.
The user was able to connect to the network resources yesterday. You verify that the user's computer is
properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97.
You need to restore access to network resources.
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
Which command is used to verify that a server is connected to the network?
Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
Which of these addresses is a multicast address?
Which of the following uses pointer records and A records?
Display a client's address
The ipconfig command will:
Reduce the number of nodes in a broadcast domain.
One reason to incorporate VLANs in a network is to:
Which of these is an application layer protocol?
The top-level domain of www.adventureworks.com is:
At what layer in the OSI model are hardware addresses referenced?
You need to divide a network into three subnets. Which device should you use?
The type of connector used on a 100BaseT Ethernet cable is:
Provide Layer 3 routing functions.
In addition to switching, multilayer switches also:
Support multiple VLANS
One reason to replace an unmanaged switch with a managed switch is to:
. Crossover cable
To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:
Forward traffic to other networks
The function of a router is to:
Forward the packet to the default route.
If a router cannot determine the next hop for a packet, the router will:
In which physical network topology is each computer connected to a central point?
Dial-up & Leased line
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
A private network that allows members of an organization to exchange data is an
The radio broadcast access method.
Security is a concern on wireless networks due to:
. Uses redundant paths.
A characteristic of the mesh topology is that it:
To protect a network when it is connected to the Internet, you should use a:
Make resources available to the Internet
One purpose of a perimeter network is to:
Which protocol can be used to encrypt packets on the Internet?
Domain Name Service (DNS)
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
Be unable to obtain their leases from the server
If a router is installed so that it separates a DHCP server from its clients, the clients will:
Which of the following services masks internal IP addresses from outside the network?
Lightweight Directory Access Protocol (LDAP)
The query protocol used to locate resources on a network is:
Report the route taken by packets across an IP network.
Tracert is used to:
Sets with similar terms
MTA NETWORKING QUIZ~!
TECH 1110 -- Network and Communications (Chapter 9)
MIS Ch 9
Sets found in the same folder
MTA Network Fundamentals (#1-10)
MTA Networking Fundamentals. (#11-20)
MTA Network Fundamentals (#21-30)
MTA Networking Fundamentals. (#31-40)
Other Quizlet sets
Industrial Revolution Study Guide
Test 1 study guide math
Chapter 9 SB
A network security audit exposes three insecure wireless routers using default configurations. Which security principle has been ignored?
Which authentication protocol is unique to DSL?
What does layer 2 do in wireless LANs?
In which layer(s) of the OSI model do NICs operate?