Study sets, textbooks, questions
Upgrade to remove ads
Networking Part 1 lol
Terms in this set (41)
Which protocol in IPsec provides both authentication and encryption?
ESP (Encapsulating Security Payload)
What is the main criteria used by firewalls to filter traffic?
Protocols and Ports. Applications are for next-generation firewalls and are not major.
You need to connect a network adapter to a switch. You need the connection to be able to send and receive data at the same time. What type of connection should you use?
Your ISP recently installed a T1 line. What is the maximum throughput of a T1 line?
You are needing to set up a VPN between two companies that are collaborating on a project. Which type of VPN will you set up?
Site-to-Site (Between two companies or two locations within a company)
Which are examples of leased lines?
T1 and DSL
Your purchasing department has purchased new 802.11ac wireless routers. You want to make sure all of your wireless devices are compatible with this new router. Besides 802.11ac, which wireless standards will work with these wireless routers?
802.11n (300 Mbps at 2.4 or 5 GHz) and 802.11a (54 Mbps at 5 GHz)
You need to connect three wireless networks together: an 802.11a, an 802.11g, and an 802.11n. Which wireless tool should you use to accomplish this task?
Wireless bridge. Enables connectivity of different wireless networking standards.
Connecting several computers together in a circle without the use of a hub or switch is using a _____ Topology.
In a ____ topology, every single computer is connected to every other computer on the network.
A ______ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.
Which role needs to be added to Windows Server 2016 in order to enable routing through the server?
Which type of network cables can carry signals over the longest distances?
You need to find the MAC address of the network adapter for the computer you are currently working on. What command will give you the information you need?
ipconfig/all. NOT ipconfig
You need to set up 750 computers on the same network. Which IP class is the best option?
You need to subnet a 192.168.1.0 network using a class C network. What will be the subnet mask?
You need to set up a group of IPv6 network interfaces in such a way that each packet is delivered to each interface. You should implement a(n) _____ address.
Which is the local loopback address in IPv6?
Which file resolves NetBIOS names to IP addresses?
Which data transmission method used a private tunnel over a public network?
Which two statements are true about Microsoft security zones?
The default security level for Local intranet and Trusted sites is the same.
Internet Explorer has four security zones.
Match each port speed to its definition,
1 Kbps - 1,000 bits per second
10 Mbps - 10,000,000 bits per second
1 Gbps - 1,000 bits per second
1000 Kbps - 1 Mbps
E1 connections use 32 channels to obtain a top speed of "2.048 Mbps". Change?
How many T1 lines are used for a full T3 connection?
28 T1 lines
An example of a physical "ring" topology would be eight hubs connected to a single switch. Change?
In a star topology, a bad cable affects only two interfaces.
In a star topology, failure of a central connectivity device does not bring down the entire network.
In a star topology, a central connection point allows for flexibility and scalability.
A switch stack makes multiple physical switches appear as on logical switch.
Load balancing is limiting to routers and is not available on switches.
Switches can use active-passive load balancing.
Which two statements are true about layer 2 switches?
If a switch does not know where to forward a frame, it floods it out all ports.
A switch uses MAC address table to determine where to forward frames.
A router is a device that functions primarily on the "Data Link" layer of the OSI model. Change?
Which IP address in a routing table signifies a default route?
Microwave ovens tend to cause interference in wired networks.
Fluorescent lighting can cause EMI.
Cordless phones can cause interference for wireless networks.
Cat2, Cat3, CAT5, CAT 5e
TCP/UDP port 1723
UDP port 1701
TCP port 443
PPTP, L2TP, SSTP, PPP
SSTP, PPP, PPTP, L2TP
A technology used on Layer 1 of the OSI model to transmit data.
Uses MAC addressing to determine which port to forward a frame.
Connects two networks using different protocols.
Router, Layer 2 Switch, Ethernet, Network Interface Card
Layer 2 Switch
Unsecured websites are accessed through port 80 by default.
Public websites are accessed through port 25.
Secured websites are accessed through port 443 by default.
184.108.40.206, 100.100.1.1, 220.127.116.11, 18.104.22.168, 241.241.241.241
"AAAA" records resolve hostnames to 128-bit IP addresses. Change?
ipconfig /release is the command that deletes an IP address bound to an interface.
dhcp -renew is the command that acquires an IP address from a DHCP server.
dhcp -release is the command that deletes an IP address bound to an interface.
ipconfig /renew is the command that acquires an IP address from a DHCP server.
Firewalls mainly use user accounts to filter data packets.
Firewalls can be hardware or software-based.
Firewalls are only set up on individual host machines.
Which of the following statements are true about RIP router protocols?
A route cannot contain more than 15 hops.
Routes are calculated based on the number of hops required.
Other sets by this creator
US History Midterm Part 2
part 1 mid term review united states lfamao p
Networking Part 2 leaomma
history final exame part 2 lma
Other Quizlet sets
Finance Exam 3
C# Ch 1