Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Other
Computer Skills
Cisco
MTA Networking Fundamentals 98-366
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (80)
Automatically maintains routing tables.
One advantage of dynamic routing is that it:
05:35:AB:6E:Al:25
Which of the following represents a Media Access Control (MAC) address?
Network address translation (NAT).
Connecting to a private network address from a public network requires:
Switch
A network device that associates a Media Access Control (MAC) address with a port is a:
Switch
A Layer 2 device that connects multiple computers within a network is a:
100 m
A cable that meets the l000BaseT standard has a maximum length of
Network administrator
A router's static route is set by the:
NSLOOKUP
Which setting is used to determine the Domain Name System (DNS) settings on a client computer?
255.255.0.0
The default subnet mask for a Class B network is
25
The default port used for SMTP is
Self-test a host's own network interface & Determine whether a host is reachable.
The ping tool is used to: (Choose two.)
Address reservation & IP address exclusion
Which of the following are features of DHCP? (Choose two.)
NETSTAT
The command-line tool used to list a host's active incoming connections is
DHCP
A computer that has an IP address of 169.254.0.1 cannot access the network.
Which of the following services should you confirm is available?
220.100.100.0/24
Which network does the IP address 220.100.100.100 belong to?
255.255.255.240
Which subnet mask is valid?
Windows Internet Name Service (WINS).
A service that resolves NetBIOS names to IP addresses is:
Host (A) DNS record
What type of DNS record maps hostnames to addresses?
Allows IPv6 connectivity through IPv4 devices.
Teredo tunneling is a protocol that:
255.255.255.0
What is the default subnet mask for a Class C Internet network?
23
The default port used for telnet is:
Attempt to obtain a new address by broadcasting.
When a client's DHCP-issued address expires, the client will:
The DNS is not resolving.
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt?
Network interface card (NIC).
A Media Access Control (MAC) address identifies a/an:
Extranet
Two companies want to share data by using the Internet. Which type of network provides the solution?
A secure connection through public networks.
VPNs are implemented to provide:
Electromagnetic interference (EMI)
If an 802.llg Internet connection has connectivity problems, what may be the cause?
The transmission standard of the equipment used
Which of these factors has the biggest impact on data transmission speed in a wireless network?
VPN
Which of the following uses a tunneling protocol?
Perimeter
A network that separates an organization's private network from a public network is a/an:
Wireless
Which type of network is most vulnerable to intrusion?
Distance from the access point.
Attenuation in a wireless network signal is a result of:
WAN
Which type of network covers the broadest area?
Contention & Token passing
In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
Hub
In a physical star topology, the central device is referred to as a:
VPN
Which technology can you use to extend an internal network across shared or public networks?
802.11g & 802.11n
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
A connection will be established.
What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?
DS3 (T3 Line)
Which technology provides the highest bit rate?
Encrypted connection across the Internet.
A VPN is a/an:
Topology and protocols
Which of the following determines the media access method that is used in a network?
WI-FI Protected Access (WPA)
Which wireless authentication method provides the highest level of security?
Physical and logical characteristics.
The topology of a local area network (LAN) is defined by the:
54 Mbps.
The maximum throughput of an 802.llg network is:
Host address
A node within a local area network (LAN) must have a network interface device and a:
Point-to-Point Protocol (PPP)
Which of the following is a Layer 2 WAN protocol?
Trunk port
Which type of port is used to support VLAN traffic between two switches?
Address Resolution Protocol (ARP).
The protocol that maps IP addresses to a Media Access Control (MAC) address is:
Verify that the DHCP service is available.
A user reports that she cannot connect to network resources from a computer on the company network.
The user was able to connect to the network resources yesterday. You verify that the user's computer is
properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97.
You need to restore access to network resources.
mail
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com
is:
192.168.1.1 255.255.255.128
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
PING
Which command is used to verify that a server is connected to the network?
::1
Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
224.0.0.1
Which of these addresses is a multicast address?
DNS Server
Which of the following uses pointer records and A records?
Display a client's address
The ipconfig command will:
Reduce the number of nodes in a broadcast domain.
One reason to incorporate VLANs in a network is to:
FTP
Which of these is an application layer protocol?
com
The top-level domain of www.adventureworks.com is:
Data link
At what layer in the OSI model are hardware addresses referenced?
Router
You need to divide a network into three subnets. Which device should you use?
RJ-45
The type of connector used on a 100BaseT Ethernet cable is:
Provide Layer 3 routing functions.
In addition to switching, multilayer switches also:
Support multiple VLANS
One reason to replace an unmanaged switch with a managed switch is to:
. Crossover cable
To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:
Forward traffic to other networks
The function of a router is to:
Forward the packet to the default route.
If a router cannot determine the next hop for a packet, the router will:
Star
In which physical network topology is each computer connected to a central point?
Dial-up & Leased line
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
Intranet
A private network that allows members of an organization to exchange data is an
The radio broadcast access method.
Security is a concern on wireless networks due to:
. Uses redundant paths.
A characteristic of the mesh topology is that it:
. Firewall
To protect a network when it is connected to the Internet, you should use a:
Make resources available to the Internet
One purpose of a perimeter network is to:
HTTPS
Which protocol can be used to encrypt packets on the Internet?
Domain Name Service (DNS)
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
Be unable to obtain their leases from the server
If a router is installed so that it separates a DHCP server from its clients, the clients will:
NAT
Which of the following services masks internal IP addresses from outside the network?
Lightweight Directory Access Protocol (LDAP)
The query protocol used to locate resources on a network is:
Report the route taken by packets across an IP network.
Tracert is used to:
Sets with similar terms
MTA NETWORKING QUIZ~!
50 terms
MTA NETWORKING
50 terms
TECH 1110 -- Network and Communications (Chapter 9)
47 terms
MIS Ch 9
44 terms
Sets found in the same folder
MTA Network Fundamentals (#1-10)
10 terms
MTA Networking Fundamentals. (#11-20)
10 terms
MTA Network Fundamentals (#21-30)
10 terms
MTA Networking Fundamentals. (#31-40)
10 terms
Other Quizlet sets
HS 1
137 terms
Industrial Revolution Study Guide
51 terms
Test 1 study guide math
53 terms
Chapter 9 SB
90 terms
Related questions
QUESTION
A network security audit exposes three insecure wireless routers using default configurations. Which security principle has been ignored?
QUESTION
Which authentication protocol is unique to DSL?
QUESTION
What does layer 2 do in wireless LANs?
QUESTION
In which layer(s) of the OSI model do NICs operate?