Net + Practice
Terms in this set (100)
PPP (Point-to-Point Protocol)
is a data link layer encapsulation protocol that is used to allow communications between network nodes.
MPLS (Multiprotocol label switching)
is a new technology that passes data from node to node using locally significant labels instead of network addresses.
Where is the NIC located?
Layer 1 Physical layer
Load balancing, caching and traffic shaping can be used to reduce what?
Which type of cable is required to connect to a computer and then to router?
Which command can you use to view and manage the routing table on current windows operating systems?
Network-based Intrusion prevention system (NIPS)
monitors entire network and analyzes its activities.
Host-based Intrusion Protection System (HIPS)
application that monitors the traffic of a specific host or a list of host addresses.
Signature-based Intrusion Detection System (IDS)
uses a predefined set of rules that can be pattern based or uses a signature provided by a software vendor to identify traffic that is unacceptable.Only used for detection not prevention
Protocol based IDS
may be installed on a web server and used to monitor the protocol(s) used by the computer.
When installing a wiring cabinet what is the connection point for the drop and patch cables referred to?
Which of the following is a protocol varient of the PPP remote networking protocol?
Port Address Translation
a feature of network device that translates communications made between hosts on a private network and hosts on a public network; allows a single public IP address to be used by many hosts on the private network; typically transparent to both the internal and external hosts.
ensures that each system on an internal network has a corresponding IP address that can be routed.
Provides a pool of various external IP addresses that can be used when an internal client wants to access something externally. Helps in environments that have only a limited # of external addresses to use and not all clients are going to be active at the same time.
What shows you the computer's route table?
which displays the contents of a PC's routing table
Which wireless tool uses a 64-bit or 128-bit encryption key?
At which OSI level do WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider?
IEEE standard that specifies how VLAN and trunking information appear in frames and how switches and bridges interpret that information
Show IP Route
Which Cisco IOS command can you use to see the IP routing table?
UNIX/Linux utility that traces the route that a packet takes from source computer to destination host.
how do you clear the routing table of all gateway entries from the command line?
You would run the following command to add a static route to the network:
this command is used to delete a particular entry from the routing table.
has the pins exactly reversed from one end to the other. This cable is typically flat, light blue cables and are the most commonly used to connect to a network devices console port.
Straight through cable
this cable has a connection as set by the T-568B or T-568A wiring Standard on both ends. You typically use this cable to connect dissimilar devices, such as a PC to a Switch, a PC to a hub, or a switch to a router.
this cable has a connection set by the T-568A wiring standard on one end, and a T-568 B connection on the other end. You would typically use this cable to connect 2 similiar devices, such as a PC to PC, a hub to a hub, a switch to a switch, or a switch to a hub.
Works at the network layer and can handle multiple tunnels at the same time.
Challenge Handshake Authentication Protocol
A remote access authentication protocol. It has the serving system challenge the remote client, which must provide an encrypted password.
What is known as a port scanner?
Transport Layer Security
A data encryption technology used for securing data transmitted over the Internet. TLS succeeded SSL. (13)
Data Encryption Standard
A symmetric-based algorithm which can be used by a single user for encrypting data for storage on a hard disk or other medium. Created by IBM and using a 64-bit block size with a 56-bit key, this block cipher was originally defined as a government standard before its replacement. Can be broken through brute force.
Address Resolution Protocol
What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
is part of a network on which you place servers that must be accessible by sources both outside and inside your network.
Many utilities, cities, and organizations are experimenting with ____ to provide Internet access to homes and businesses over standard high-voltage power lines.
Spanning Tree Protocol
To prevent Loops from forming on LAN because there are no TTL values. STP analyzes network and develops topology to prevent switching loops from occuring.
is a tunneling protocol used to create a VPN connection. The connections are encrypted through the entire connection, from one point to the other, making it difficult to intercept.
applies ACLs to in-bound and out-bound traffic. Also evaluates the TCP handshake to determine if a connection is legitimate.
is an interior gateway protocol, designed for use within an administrative domain or network. This is in contrast to Exterior Gateway protocols, primarily Border Gateway Protocol (BGP), which is used for routing between autonomous systems. is a link-state routing protocol, operating by reliably flooding link state information throughout a network of routers. Each ***
router independently builds a database of the network's topology, aggregating the flooded network information. Like the OSPF protocol,
*** uses Dijkstra's algorithm for computing the best path through the network. Packets (datagrams) are then forwarded, based on the computed ideal path, through the network to the destination.
time domain reflectometer (TDR)
is a device used to send a signal through a particular medium to check the cable's continuity. Good-quality TDRs can locate many types of cabling faults, such as a severed sheath, damaged conductors, faulty crimps, shorts, loose connectors, and more.
Enhanced IGRP (EIGRP)
is a hybrid routing protocol developed by Cisco. makes decisions based on metric information it receives from neighbors, and it employs some of the mechanisms of link-state protocols. It establishes adjacencies with neighboring routers, sends only changes in its updates, and keeps a topology database of the network. uses Diffusing Update Algorithm (DUAL) to achieve rapid convergence, conserve bandwidth, and support multiple network protocols.
Link State Routing Prtocol
What distant vector protocols exhibit classless behavior?
The default mode for all switches supporting VTP. You can create, modify, and delete V LANs and
specify other configuration parameters (such as VTP version)
for the entire VTP domain. VTP servers advertise their V LAN configurations to other switches in the same VTP domain and synchronize their V LAN configurations with other switches based on advertisements received over trunk
links. V LAN configurations are saved in NV RAM.
Behaves like a VTP server, but you cannot create, change, or delete V LANs on a VTP client. V LAN configurations are saved in NV RAM.
Does not advertise its V LAN configuration and does not synchronize its V LAN configuration based on received advertisements. However, they will forward VTP advertisements as they are received from other switches. You can create, modify, and delete V LANs on a switch in VTP transparent mode. V LAN configurations are saved in NV RAM, but they are not advertised to other switches.
Offers speeds of 300mbps downstream and 75 mbps upstream. LTE is a step towards 4g mobile phone/device networking. Peak speeds of 1 gbps should be expected in future revisions. LTE is based on GSM/EDGE and UMTS/HSPA network technologies.
Channel service unit/data service unit (CSU/DSU) is a Layer 1 device that connects your serial ports on your router to the provider's network and connects directly to the demarcation point (demark) or location.
The MIME standard works at which OSI model Layer?
is a method of packet filtering used by firewalls. This allows a firewall to allow or deny traffic based on the information in the first few packets of a data stream. Stateful packet filters are able to identify data streams, which allows for their functionality.
is a technology commonly used by firewalls. This type of packet filtering requires a firewall to examine the header of each packet that traverses the firewall to make the determination of whether or not the packet should be allowed.
SSH (Secure Shell)
Secure Shell - A protocol for secure remote logon and secure transfer of data.
SSL Secure Socket Layer
is a protocol that is responsible for securing traffic over a TCP/IP network. When combined with HTTP, it can offer a layer of security to web traffic
100 Mbps speed, 2 km Maximum Distance, Multimode Fiber Cabling with ST or SC connectors.
Which of the following protocols support VLSM, summarization, and discontiguous networking?
OSPF, RIPv2, EIGRP
What device can measure the time a signal goes down and back a cable?
What wire pairs connect to a 66-block from the telecommunication company?
If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?
2.4 ghz, 11 mbps
2.4 ghz, 54 mbps, backward compatible with b
5 ghz, 54 mbps with 12 non-overlapping channels.
2.4 & 5 ghz, mimo 100 +
Which of the following is a network device that is used to connect multiple devices without segmenting a network?
Routing tables are updated automatically when changes occur in the network.
In dynamic routing, routers update each other with all the networks they know about and place this information into the routing table. This is possible because a protocol on one router communicates with the same protocol running on neighbor routers. If changes occur in the network, a dynamic routing protocol automatically informs all routers about the event. Option D is wrong because forwarding packets through an internetwork is a routed protocol's job (i.e., IP, IPv6).
Which of the following describes dynamic routing?
Packets specifically have to be carried to a router in order to be routed through a network.
Your host needs to send a packet to a remote network. What is the destination address in the frame?
A user is complaining that it takes too long to access an application on a remote server. Which utility will identify the number of hops from the client to the server where the application resides?
A lock on the server room is good, but a biometric lock that records who accesses the server room and when is better.
Which of the following will prevent unauthorized access to the server room?
Create a guest V LAN.
You have multiple contractors that need to connect to the Internet at your corporate site. Which of the following is a good solution to help maintain your security?
Interference from a cordless phone
Users are complaining that their 802.11g network is going up and down, and when it does work, it has slow response time. What could the problem be?
Coax, 10mbps, 500 meters per segment. Also called thicknet, this cable uses vampire taps to connect devices to cable.
BGP is the routing protocol used on the Internet for its ability to make classless routing and summarization possible. These capabilities help to keep routing tables smaller and more efficient at the ISP core.
What routing protocol is typically used on the Internet and allows routing information to be passed from one autonomous system to another?
What is the dotted-decimal equivalent of 11000000.10101000.00110011.00001111?
When would you possibly find Frame Relay being utilized in a corporate network in order to help save money?
When a centralized office needs to communicate with many branch offices and when a full mesh of WAN links is in place.
What protocol does a host use to find the hardware address of a neighbor host by using their IP address so they can communicate?
What type of physical device must you have between host devices for full duplex to function?
Coax, 10mbps, 185 meters per segment. Also called thinnet a very popular implementation of Ethernet over coax.
UTP, 10mbps, 100 meters per segment. One of the most popular networking schemes.
UTP, STP, 100mbps, 100 meters per segment. Two Pairs of Category 5 UTP.
Fiber, 10mbps, Varies (ranges from 500 meters to 2,000 meters). Ethernet over Fiber optics to the desktop.
UTP, 1000Mbps, 100 meters. Four pairs of Category 5e or higher.
MMF, 1000Mbps, 500 meters. Uses SC fiber connectors. Max length depends on fiber size.
UTP, 10Gbps, 100 meters. Connects to the network like a Fast ethernet link using UTP.
SMF, 10Gbps, 40 kilometers, 1550 nm laser. Max length depends on fiber size on quality.
SMF, 10Gbps, 40 kilometers. 1550 nm optical wavelength.
SMF, 10Gbps, 10 kilometers. Typically used with SONET.
Which Windows TCP/IP utility will produce the following result?
Internet Address Physical Address Type
220.127.116.11 A0-ee-00-5b-0e-ac dynamic
You connect two switches together using a crossover cable and your whole network goes down. What is the problem?
A switching loop has formed.
If you have two switches connected together and do not have a loop-avoidance scheme implemented, you will cause broadcast storms and multiple unicast frames retransmitted in your network, which brings down the network. Enable STP.
You are on a Windows machine and want to know what the system name is. What command can you type at a command prompt to find out?
Your boss asks you to implement a system that detects and reports attempts of unauthorized access to the network. What system will you install?
Which routing protocol is considered distance vector and is an EGP?
BGP is in the distance vector family and is considered an exterior gateway protocol (EGP), which connects autonomous systems together.
Your boss wants Gigabit Ethernet in his office. It is all the way up the hall from the switch closet. You are concerned about distance. What is the maximum cable length in a 1000BaseT network?
100 meters (328 feet)
100BaseT and 1000BaseT both have a maximum cable distance of 100 meters.
If a switch receives a frame and the destination hardware address is not in the forward/filter table, what will the switch do with this frame?
Send it out all ports
Switches transmit ________________ out all ports so that all links between switches can be found.
Switches transmit *
Bridge Protocol Data Units (BPDUs)
*out all ports so that all links between switches can be found.
When switches are configured with STP, in what states is the MAC address table populated?
Switches populate the MAC address table only in the learning and forwarding states.
You want to connect multiple ports on a switch in your office to multiple ports on a switch in another switch closet. What advanced feature allows these ports to be combined and managed as a single entity?
What command will show you the DNS server your host is using to resolve hostnames?
The ipconfig command can be used to see IP configuration information on your host, but to see DNS server information, you need to use ipconfig /all. However, ipconfig is the best answer to this question.
You just connected an RJ-11 connector to some wires. How many pairs did you use?
RJ-11 uses only four wires, or two-pairs of wires.
Which of the following uses a centralized authentication method?