Study sets, textbooks, questions
Upgrade to remove ads
MTA Questions That Stumped Me
Terms in this set (54)
What is the primary disadvantage of a bus topology?
If there is a problem with the cable, the entire network breaks down.
What are three common forwarding methods used by LAN switches?
Cut-through, store-and-forward, fragment-free
What is the primary advantage of implementing a dynamic routing protocol versus using static routing?
Who is the standards agency for TCP/IP?
Which is a protocol suite for securing internet communications by authenticating and encrypting each IP packet of a data stream?
Connecting to a private network address from a public network requires:
Network address translation (NAT)
A cable that meets the 1000BaseT standard has a maximum length of:
100m or 328ft
The default port used for SMTP is:
A service that resolves NetBIOS names to IP address is:
Windows Internet Name Service (WINS)
If an 802.11g internet connection has connectivity problems, what may be the cause?
Electromagnetic interference (EMI)
In a physical star topology, the central device is referred to as a:
What happens when an 802.11b node starts broadcasting within the range of an 802.11g access point?
A connection will be established
Which technology provides the highest bit rate
The topology of a local area network (LAN) is defined by:
the physical and logical characteristics
Which of the following is a Layer 2 WAN protocol?
Point-to-Point Protocol (PPP)
The protocol that maps IP address to MAC addresses is:
For what purpose is ad hoc networking mode used in wireless networking?
To enable wireless computers to form a network when no wireless access point (WAP) is present
What is the role of a RADIUS server in a wireless network that is secured using Wi-Fi Protected Access (WPA)?
An infrastructure mode WLAN:
Can be used to connect wireless clients to a wired network
Which WLAN security standard supports AES encryption?
Which type of firewall filtering would you configure to filter traffic based on packet content?
Which device is used to prevent traffic destined for a specific port form being received from the Internet?
The internet security zone includes:
All external web sites that are not listed in the restricted or trusted sites zone
A three-homed perimeter network configuration requires:
One firewall with multiple interfaces
What method of configuring a VLAN offers the best scalability?
Frame tagging-switch tags each frame and uses the tag to determine the route that the frame should travel (builds own CAM table whereas Frame Filtering has to be manually built)
In which of the following situations would you want to configure a VPN?
Home-based telecommuters need intermittent connections over the internet to the internal network
Which of the following is dial-up?
ISDN (Integrated Services Digital Network)
What is the transmission rate of t1?
Allocates more bandwidth for download traffic than for upload traffic
23 B channels for transmission and one D channel
Which type of DSL provides 1.544 duplex transmission on a single twisted pair line?
Which access method is defined in the 802.5 specification?
Which two cable are used for coaxial?
10Base-2 and 10Base-3
A router does not have an entry in its routing table associated with the destination address.
Where will is send it?
To its default next router
You are configuring a router as a firewall for you perimeter network. You want to provide the highest possible level of protection to your network.
Which is the most sophisticated method for managing traffic through a router?
What is the role of routing protocols?
To dynamically update route information
You have a managed switch with servers connected to ports 1, 2, 3, and 4. An attacker gains access to the server on port 2 and installs software to monitor and record communications on the network.
Which statement describes the impact to network security?
The attacker can access traffic to and from the server on port 2 only
The speed at which packets are transferred between modules in a modular switch is known as its:
Which port number are considered dynamic, or private, port numbers?
Port 110 is the well-known port used by:
test name server operations
map route information between hosts
display network configuration information
A firewall separates a management workstation from a router.
You need to manage the router using telnet when a port hasn't been specified.
Which traffic must the firewall allow?
Traffic on port 23
You are configuring a VPN access for home-based users.
Communication security can be provided through which of the following?
IPSec is used to:
Encrypt and authenticate packets
When would you need to deploy Windows Routing and Remote Access (RRAS) services?
To configure VPN site-to-site connections
You have routed network with a single DHCP server,. There are no DHCP Relay agents on the network. All clients are configured for dynamic addressing.
What do you need to enable on the router?
WINS is used to map:
NetBIOS names to IP addresses
Which is the first step for a host to resolve a fully qualitied domain name (FQDN) on a network that includes an authoritative Domain Name System (DNS) server?
Check the FQDN against the local host name
is used to resolve and IP address to an FQDN.
Which is used to resolve a FQDN to an IP address?
Which DNS record is used to resolve a FQDN to an IPv6 address?
identifies the primary DNS server for a zone
Sets found in the same folder
Networking MTA Questions I Feel Confident with
Well-Known Port Numbers
Sets with similar terms
MTA Networking Fundamentals 98-366
MTA Networking Fundamentals Practice
MTA NETWORKING QUIZ~!
Other sets by this creator
C839- Intro To Cryptology
IP Addresses, Subnetting, CIDR