(7/20) MTA 98-366 Networking Fundamentals
Breaking down the mega sets: "This is number 3 of 3 combined sets of all the study sets on "MTA 98-366 Networking Fundamentals" that I was able to find here. Many thanks to all the editors of the existing sets!" (DITTO!x100!)
Terms in this set (40)
What is the most common central device used today to connect computers to a network?
What is the most common adapter or connector used to connect a computer to a wired network?
Which of the following does a switch use for increased performance?
A switch switches very fast between multiple connections, which allow multiple computers to communicate at
the same time. As a result, each client can send and receive at the same time (full duplex), which gives better
What do you use to isolate a group of computers within your organization?
What do you use to create VLANs
What zone is used to publish external websites for an organization?
A perimeter network (also known as a demilitarized zone or DMZ) is a small network that is set up separately from a company's private LAN and the Internet. It is called a perimeter network because it is usually on the edge of the LAN.
Which network topology is the most redundant and the most expensive?
What standard describes CSMA/CD?
What mechanism do wireless networks use to access the network?
What model promises the most processing power?
Which model user a central database for authentication?
What type of server does Active Directory run on?
Which model has each host have their own security database?
What is used to uniquely identify a host on a TCP/IP network?
A _________ is a single computer or device that connects to a TCP/IP network. (Two answers)
What is the central device used in wireless LANs?
Wireless Access Point
What command do you use to test the TCP/IP stack on a computer? (3 answers)
What model is used to describe how data communication occurs between hosts?
OSI reference model
Which layer in the OSI model do MAC addresses and switches use?
Data link, layer 2
Which layer in the OSI model covers routing between networks?
Network layer, layer 3
"Which layer in the OSI model is used to verify thatdata was delivered without error?"
Transport layer, layer 4
Which layer in the OSI model covers HTTP, FTP, and RDC?
Application, layer 1
Which layer of the OSI model is used to create a connection so that a host can transfer files?
Which layer of the OSI model includes VLANs?
Data link, layer 2.
Layer 2 switching can also allow for a virtual LAN(VLAN) to be implemented.
Which protocol do you use as the transport protocolfor a video application?
UDP (User Datagram Protocol)
Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?
What layer in the OSI model is responsible for logging on and off?
The Session layer governs the establishment, termination, and synchronization of sessions within the OS over
the network and between hosts. When you log on, youare creating a session while on the network.
What layer in the OSI model is used to encrypt data?
The Presentation layer covers both compression and encryption.
Which layer in the OSI model includes the cable andnetwork adapters?
Physical, layer 1
How many layers does the TCP/IP model have?
Which layer in the OSI model is included in the TCP/IP model?
In the TCP/IP model, the OSI Physical layer is skipped altogether, and the Application layer comprises the OSI application, presentation, and session layers. The Transport layer is the only one from the OSI model that also appears in the TCP/IP model.
Which protocol is used to translate IP addresses to MAC addresses?
ARP (Address Resolution Protocol)
What ports are defined above 49,152?
Dynamic ports, also known as private ports, can be used by applications, but they cannot be registered by vendors. Dynamic ports are from port 49152 to 65535.
TCP/IP and IPX/SPX are known as _________ stacks.
What is the advantage of UDP over TCP?
Less Overhead - Faster Performance
What are the seven layers found in the OSI model, in order?
What is the maximum speed supported by 802.11b?
What is the most common network cable used today?
Unshielded twisted-pair (UTP) is the cable most commonly used in local area networks.
If you are making a crossover cable and one end is 568A, what should the other end be?
If you want to connect a computer directly to another computer without using a switch, you use a __________.
YOU MIGHT ALSO LIKE...
Test Preparation TOEIC, SAT, TOEFL
Chapter 1: Introduction to Networking
Lesson 2: Defining Networks With The OSI Model
MTA Networking Fundamentals
OTHER SETS BY THIS CREATOR
Recovery Console Commands
CVV1 - DB Fund. Ammended (edits in progress)
THIS SET IS OFTEN IN FOLDERS WITH...
(18/20) MTA 98-366 Networking Fundamentals
(2/20) MTA 98-366 Networking Fundamentals
(19/20) MTA 98-366 Networking Fundamentals
(3/20) MTA 98-366 Networking Fundamentals