Study for Comptia Network Plus Cert
Terms in this set (295)
Authentication Authorization and Accounting
Access Control List
Asymmetric Digital Subscriber Line
Advanced Encryption Standard
Automatic Private Internet Protocol Addressing
American Registry for Internet Numbers
Address Resolution Protocol
Application Service Provider
Asynchronous Transfer Mode
Bit-Error Rate Test
Border Gateway Protocol
British Naval Connector / Bayonet Niell-Concelman
Boot Protocol /Bootstrap Protocol
Bridge Protocol Data Unit
Basic Rate Interface
Basic Service Set Identifier
Channel Access Method
Common Address Redundancy Protocol
Closed Capkon TV
Challenge Handshake Authentication Protocol
Classless inter domain routing
Challenge-Response Authentication Mechanism - Message Digest 5
CSMA / CA
Carrier Sense Multiple Access / Collision Avoidance
CSMA / CD
Carrier Sense Multiple Access / Collision Detection
Channel Service Unit
Dynamic Host Configuration Protocol
Data Link Control
Domain Name Service / Domain Name Server / Domain Name System
Data-Over-Cable Service Interface Specification
Denial of Service
Distributed Denial of Service
Digital Subscriber Line
Direct Sequence Spread Spectrum
Data Service Unit
Dense Wavelength Division Multiplexing
E-Carrier Level 1
Extensible Authentication Protoco
Extension Mechanisms for DNS
Exterior Gateway Protocol
Enhanced Interior Gateway Routing Protocol
Extended Service Set Identifier
Encapsulated security packets
Fiber Distributed Data Interface
Frequency Division Multiplexing
Frequency Hopping Spread Spectrum
Fully Qualified Domain Name / Fully Qualified Distinguished Name
File Transfer Protocol
File Transfer Protocol Security
Gigabit Interface Converter
Giga bits per second
GNU Privacy Guard
High-Level Data Link Control
Host Intrusion Detection System
Host Intrusion Prevention System
High Speed Packet Access
Hot Standby Router Protocol
Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure
Internet Assigned Numbers Authority
Independent Computer Architecture
Internet Corporation for Assigned Names and Numbers
Internet Control Message Protocol
Internet Connection Sharing
Intermediate Distribution Frame
Intrusion Detection System
Institute of Electrical and Electronics Engineers
Internet Group Multicast Protocol
Interior Gateway Protocol
Internet Information Services
Internet Key Exchange
Internet Message Access Protocol version 4
Internet Network Information Center
Intrusion Prevention System
Internet Protocol Securit
Internet Protocol version 4
Internet Protocol version 6
Internet Security Association and Key Management Protocol
Integrated Services Digital Network
Internet Service Provider
Kilobits per second
Layer 2 Forwarding
Layer 2 Tunneling Protocol
Link aggregation control protoc
Local Area Network
LDAP Lightweight Directory A
Local Exchange Carrier
Light Emitting Diode
Logical Link Control
Media Access Control / Medium Access Control
Megabits per second
Megabytes per second
Main Distribution Frame
Media Dependent Interface
Media Dependent Interface Crossover
Management Information Base
Multiple Input, Multiple Output
Multi-Protocol Label Switching
Microsoft Challenge Handshake Authentication Protocol
Mechanical Transfer-Registered Jack
Network Access Control
Network as a Service
Network Attached Storage
Network Address Translation
Network Control Protocol
Network Basic Input / Output Extended User Interface
Network Basic Input / Output System
Network File Service
Network Interface Card
Network Intrusion Detection System
Network Intrusion Prevention System
Network News Transport Protocol
Network Time Protocol
Microsoft IPX/SPX Protocol
Open Systems Interconnect
Open Shortest Path First
Optical Time Domain Reflectometer
Password Authentication Protocol
Port Address Translation
Protocol Data Uni
Pretty Good Privacy
Public Key Infrastructure
Power over Ethernet
Post Office Protocol version 3
Plain Old Telephone System
Point-to-Point Protocol over Ethernet
Point-to-Point Tunneling Protocol
Primary Rate Interface
Public Switched Telephone Network
Permanent Virtual Circuit
Permanent Virtual Circuit
Quality of Service
Remote Authentication Dial-In User Service
Reverse Address Resolution Protocol
Remote Access Service
Remote Desktop Protocol
Radio Frequency Interface
Routing Internet Protocol
Rivest, Shamir, Adelman
Real Time Protocol
Real Time Streaming Protoco
Round Trip Time or Real Transfer Time
Standard Connector / Subscriber Connector
Secure Copy Protocol
Symmetrical Digital Subscriber Line
Secure File Transfer Protocol
Small Form-factor Pluggable
Session Initiation Protocol
Serial Line Internet Protocol
Single Mode Fiber
Simple Mail Transfer Protocol
Static Network Address Translation
Simple Network Management Protocol
Simple Network Time Protocol
Start of Authority
Small Office / Home Office
Synchronous Optical Network
Standby Power Supply
Service Set Identifier
Secure Sockets Layer
Straight Tip or Snap Twist
Spanning Tree Protocol
Shielded Twisted Pair
Switched Virtual Connection
T-Carrier Level 1
Terminal Access Control Access Control System+
Transmission Control Protocol
TCP / IP
Transmission Control Protocol / Internet Protocol
Time Division Multiplexing
Time Domain Reflectometer
Trivial File Transfer Protocol
Temporal Key Integrity Protocol
Transport Layer Securi
Time to Live
User Datagram Protocol
Universal Naming Convention
Uninterruptible Power Supply
Uniform Resource Locator
Universal Serial Bus
Unshielded Twisted Pair
Variable Digital Subscriber Line
Virtual Local Area Network
Virtual Network Connection
Voice over IP
Virtual Private Network
Virtual Router Redundancy Protocol
VLAN Trunk Protocol
Wide Area Network
Wireless Application Protocol / Wireless Access Point
Wired Equivalent Privacy
Window Internet Name Service
Wireless Local Area Network
Wi-Fi Protected Access
World Wide Web
CCITT Packet Switching Protocol
eXtensible Markup Language
Extended Digital Subscriber Line
Where does a hub send data
To all the systems connected to the hub
What uniquely identifies every NIC?
Media access control address
What windows utility do you use to find the MAC address for your system
A MAC address is known as a adress
A NIC sends data in discrete chunks called
Which MAC address begins a frame
A Frame ends with a special bit called the frame check sequence, what does the FCS do?
Verifies that the data arrived correctly
Which of the following is an example of a MAC address
Which layer of the TCP/IP model controls the assembly and disassembly of data
Which layer of the OSI seven layer model keeps track of s systems connections to send the right response to the right computer?
Which of the following topologies requires termination?
Star-bus is an example of a topology
Of the topologies listed which one is the most fault-tolerant?
What term is used to describe the interconnectivity of network components?
Coaxial cable all have a ____ rating
Which of the following is a type of coaxial cable?
Which network topology connects nodes with a ring of cable?
Which network topology is most commonly seen onlyu in wireless networks?
Which of the following is a duplex fiber-optic connection?
What is the most common category of UTP used in new cabling installations?
Ethernet hubs take an incoming packet and ___ it out to the other connected ports?
What begins an ethernet frame?
What type of bus does 10BaseT use?
star bus topology
What is the maximum distance that can separate a 10BaseT node from its hub?
When used for Ethernet unshielded twisted pair uses what type of connector
What is the maximum number of nodes that can be connected to a 10BaseT hub
which of the following is not true of cross over cables?
Both ends are wired according to TIA/EIA 568B
Which of the following connectors are used by 10BaseFL cable
Which networking device can use the spanning tree protocol?
What device directs packets based on MAC address
With 100BaseT what is the max distance between the hub and the computer
What type of cable and connector does 100BaseFX use?
Multimode fiber with ST or SC connectors
How many pairs do 10BaseT and 100BaseT use?
What standard does IEEE 802.ab describe
1000BaseT or Gigabit Ethernet
What is the big physical difference between 1000BaseSX and 100BaseFX
1000BaseSX uses the SC connector exclusively.
What is the maximum distance for 1000BaseLX without repeaters?
What is the big advantage to using Fiber-optic cable?
Fiber is not affected to EM interference.
How many pairs does 1000BaseT use?
What is the standard connector for the 10 GbE Fiber standard?
there is no standard connector.
What is the maximum cable length for CAT 6?
Which of the following cables should never be used in a structured cabling installation?
Which of the following enables you to use multiple NICs in a computer to achieve a much faster network speed?
How many pairs of wires are in a CAT 5e-rated cable?
A ____ organizes and protects the horizontal cabling in the telecommunications room.
Which of the following would never be seen in an equipment rack?
a Patch panel, UPS, PC could all be seen in a rack.
What are patch cables used for? 2 answers
to connect the patch panel to the hub, to connect PCs to outlet boxes.
Which of the following network technologies use UTP cabling in a star Topology?
10BaseT and 100BaseT
Jane needs to increase network throughput on a 10BaseT network that consists of 1 hub and 30 users. Which of the following hardware solutions would achieve this most inexpensively?
Replace the hub with a swithc
What two deviecs together enable you to pick a single cable out of a stack of cables?
Tone generator and probe.
Rack mounted equipment has a height measured in What Units?
How many bits does an IPv4 address consists of?
Identify the network ID section of the following IP address and subnet mask: IP 10.14.12.43, Subnet 255.255.255.0
Which of the following is a proper subnet mask?
What does ARP stand for?
Address Resolution Protocol
Identify the class of the following ip address: 220.127.116.11
Which of the following are valid subnet masks? 2 answers
A subnet that is in binary ends in all zeros.
What is the maximum number of hosts in a /19 subnet?
8,190 (2 to the thirtteenth power-2)
What is the number 138 in binary?
When DHCP discover fails, what process will the client use to generate an address for itself?
Automatic Private IP Adressing
Which of the following is a valid loopback address?
127.24.0.1, any address in the 127.0.0.0/8 subnet will work as a loopback.
What is a router?
A piece of hardware that forwards packets based on IP address
Routers must use the same type of connection for all routes such as ethernet to ethernet or ATM to ATM.
What technology allows you to share a single public IP address with many computers?
Port address translation.
Distance vector routing protocols such as RIP rely on on what metric to determine the best route?
What are two big advantages to using OSPF over RIP or BGP? Two answers
OSPF chooses the routes based on link speed, not hop count and OSPF sends only routing tables changes, reducing network traffic.
What is area 0 called in OSPF?
What is the name of the cable that you use to connect the console port on Cisco Routers?
When you are first setting up a new router, you should never plug it into an existing network
The traceroute utility is useful for
Discovering information about the routers between you and the destination address.