











Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CNT FINAL QUESTIONS WITH 100% ACCURATE ANSWERS
Typology: Exams
1 / 19
This page cannot be seen from the preview
Don't miss anything!
The primary protocol used by clients to send an email message is the _________ protocol - Accurate answers Simple Mail Transfer Protocol (SMTP) The recipient's email server delivers the email message to the receiving client by using the _________ protocol - Accurate answers POP3 (Post Office Protocol V3) or IMAP4 (Internet Message Access Protocol V4) The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is encrypted, so it is secure and more commonly used that its predecessor - Accurate answers Secure Shell (SSH) In the Windows Operating System, the ______ application is used to provide a secure, encrypted transmission that allows a technician to remote in to a machine to make configuration changes or troubleshoot that device - Accurate answers Remote Desktop Protocol (RDP) Using the same network to deliver multiple types of communications services is known as - Accurate answers Convergence _____________ refers to the amount of traffic, or data transmission activity, on the network - Accurate answers Bandwidth mostly applies to hardware and describes how computers, other devices, and cables fit together to form the network - Accurate answers Physical Topology has to do with the software and describes how access to the network is controlled, including how users and programs initially gain access to the network - Accurate answers Logical Topology Client-Server networks have a number of advantages. Select the THREE Advantages of Client-Server networks from the following list - Accurate answers more secure, practical for many computers (100+), scalable Peer-to-Peer networks have a number of advantages - Select the TWO Advantages of Peer-to-Peer networks from the following list - Accurate answers inexpensive to set-up, simple to configure When a Windows Server controls network access to a group of computers, this logical group is called a Windows - Accurate answers Domain _______________ is the centralized directory database that contains user account information and security for the entire group of computers - Accurate answers Active Directory
covers a relatively small area (room, floor, building) uses are for sharing resources and data - Accurate answers LAN (Local Area Network) covers usually a "city-wide" area used to typically connect buildings within a city (government buildings for example) - Accurate answers MAN (Metropolitan Area Network) covers a very large area (between cities and even continents) uses are for connecting sites of a company (Harrisburg Office to Pittsburgh Office) - Accurate answers WAN (Wide Area Network) receives incoming data frame from one of its ports, reads the MAC address and then directs the data frame to the correct port to to the destination node - Accurate answers Switch a network port used to attach a device to a network and allow it to send and receive data on the network - Accurate answers NIC (Network Interface Card) a device that manages traffic between two or more networks .. and ... can help find the best path for traffic to get from one network to another typically by reading the destination IP address of the data packet - Accurate answers Router Order of data sizes S-L Bits Frames Packets Segments Data - Accurate answers Order of layers S-L Physical Data-link Network Transport Session, Presentation, Application The organization responsible for tracking the assignment of port #'s, domain names, and IP Addresses is
192.168.10.108 - Accurate answers logical address, IP address or Network layer address 6c:26:0a:70:e7:3f - Accurate answers physical/hardware address, MAC address, adapter address or Data Link layer address OUI or Block ID or Company ID - Accurate answers First 24 Bits (first 6 HEX Digits) Extension ID or Device ID - Accurate answers Last 24 Bits (last 6 HEX Digits) ____________ ensure that data is transmitted to the correct application among other applications running on a computer - Accurate answers Port Numbers The following number: 192.168.100.50: Is an example of which of the following choices? - Accurate answers Socket TCP Port Numbers - Protocols FTP SSH Telnet SMTP DNS TFTP HTTP POP NTP HTTPS - Accurate answers TCP Port Numbers - Assigned Ports 20 & 21 22 23 25 53 69 80 110 123 443 The _______protocol is used to monitor and manage network traffic - Accurate answers SNMP (Simple Network Management Protocol) The _______protocol is used to synchronize network computer clocks - Accurate answers NTP (Network Time Protocol)
The _______protocol is a communications protocol for signaling and controlling multimedia communication sessions - Accurate answers SIP (Session Initiation Protocol) At layer 3 of the OSI model there is a specific address that is added to the data to form a packet. This packet is then sent on through the network to the destination node. Select the name(s) shown below for the address that occurs at layer 3 of the OSI model. (Select the 3 Answers that apply!) - Accurate answers Network Layer Address, IP Address, Logical Address An IPv4 address is a ____ bit number that is commonly written as a dotted decimal number (4 numbers that range from 0 to 255, and each number separated by a decimal point) - Accurate answers 32 The following IP address: 224.0.0. is an example of what class of IP address? - Accurate answers Class D The following IP address: 193.160.223. is an example of what class of IP address? - Accurate answers Class B The following Subnet Mask: 255.255.255. is the default Subnet Mask for what class of IP Address? - Accurate answers Class C The following IP address: 172.16.0. is an example of what type of IP address? - Accurate answers Private IP Address The following IP address: 169.254.0. is an example of what class of IP address? - Accurate answers APIPA (Automatic Private IP Addressing) Address _______ is a technique designed to conserve public IP addresses needed by a network - Accurate answers Network Address Translation
Switch Router Firewall - Accurate answers Data Link Network Transport TCP operates in the ________ layer of the TCP/IP and OSI models and provides reliable data delivery services - Accurate answers Transport TCP uses a ________ to establish a TCP connection before data is transmitted between hosts - Accurate answers 3-Way Handshake TCP is a _____________ protocol. Before TCP transmits, it ensures that a connection or session is established before actual data is sent between hosts - Accurate answers Connection-oriented TCP on the sending host will send a character string called a ________; TCP on the destination host then generates a similar string. If the two ___________ fail to match, then the destination host asks the source to re-transmit the data. (So this is acting as a "error check") - Accurate answers Checksum(s) Because messages do not always arrive at the destination host in same order that they were created, TCP attaches a chronological _______________ to each segment so that the destination host can, if necessary, reorder segments as they arrive - Accurate answers Sequence Number(s) TCP uses __________, which is the process of gauging the appropriate rate of transmission based on how quickly the recipient can accept data. (This is typically in the form of sliding-window size) - Accurate answers Flow Control -the port number of the sending node application -the port number of the destination node application -the data segments position in the stream of data segments already sent -confirms receipt of the data via a return message to the sender -signals special conditions (SYN, ACK, PSH, RST, FIN, etc...) -indicates how many bytes the sender can issue to a reciver without acknowledgement -used by the receiving node to determine whether the TCP segment became corrupted - Accurate answers -Source Port -Destination Port -Sequence Number -Acknowledgement Number -Flags -Sliding Window Size -Checksum Order of 3-Way Handshake - Accurate answers Syn, Syn-Ack, Ack UDP operates in the ________ layer of the TCP/IP and OSI models and provides efficient transfer of data with no error checking or sequencing - Accurate answers Transport
UDP is a _____________ protocol. UDP does not use error checking or sequencing to keep track of data transferred between hosts - Accurate answers Connectionless IP operates in the ________ layer of the TCP/IP and OSI models and it specifies how and where data should be delivered - Accurate answers Network IP is a _____________ protocol. IP does not guarantee delivery of data and no connection is established before data is transmitted - Accurate answers Connectionless IP does not guarantee delivery of data and no connection is established before data is transmitted. IP depends on _______ to ensure that data packets are delivered with reliability - Accurate answers TCP identifies whether it is the IPv4 or IPv6 protocol being used - Accurate answers Version indicates the message to which the datagram belongs to and allows the receiver to re-assemble a fragmented packet - Accurate answers Identification indicates whether a message is fragmented - if fragmented also indicates if this is the last fragment - Accurate answers Flags indicates where in the data stream the fragment belongs - Accurate answers Fragment Offset indicates the maximum time a packet can remain on the network before it is discarded - Accurate answers TTL (Time to Live) indicates what upper layer protocol is encapsulated inside the packet - Accurate answers Protocol 32 bit address of sending node - Accurate answers Source IP Address 32 bit address of receiving node - Accurate answers Destination IP Address identifies which IP version the packet uses - Accurate answers Version indicates the packet's priority - it is similar to the DiffServ field in IPv4 packets - Accurate answers Traffic Class indicates "the sequence of packets" from one source to one or multiple destinations, the packet belongs to (to ensure that packets belonging to the same transmission arrive together) - Accurate answers Flow Label indicates the size of the data carried by the packet - Accurate answers Payload Length indicates the type of header immediately following the IP header - Accurate answers Next Header indicates the # of times the packet can be forwarded by routers on the network - Accurate answers Hop Limit
only factors hop count to determine the best path to a destination broadcasts routing table every 30 seconds convergence time is poor - Accurate answers RIP link-state routing protocol uses a more complex algorithm to calculate the best path to a destination fast convergence time very commonly used interior and border routers used primarily for IPv4 - Accurate answers OSPF link-state routing protocol uses a more complex algorithm to calculate the best path to a destination fast convergence time used ONLY on interior routers can be used for IPv4 and adapted for IPv6 - Accurate answers IS-IS an exterior gateway routing protocol can span multiple autonomous systems can be used on border and on exterior routers on the Internet - Accurate answers BGP The ________ utility displays TCP/IP statistics and details about TCP/IP components and connections on a host - Accurate answers netstat The ________ command uses ICMP echo requests to "show" the path from one networked node to another, identifying the all intermediate hops between the 2 nodes - Accurate answers tracert ..or ... traceroute The ________ utility combines elements of both ping and tracert to provide deeper information about network issues along a route. It sends multiple pings to each hop along a route, then compiles the information into a single report - Accurate answers pathping ..or... mtr a continuously varying signal that appears as a sine wave when graphed the human voice would be an example traditional telephone line would be an example - Accurate answers Analog Signal a signal that is composed of pulses of precise positive voltages (1's) and zero voltages (0's) a signal from a computer would be an example - Accurate answers Digital Signal measure of the strength of a signal - Accurate answers Amplitdue the number of times a signal cycles in a given period of time - Accurate answers Frequency the unit of measure of the # of cycles per second - Accurate answers Hertz the distance between corresponding points on a wave's cycle - Accurate answers Wavelength progress of a wave over time in relationship to a fixed point - Accurate answers Phase
altering the signal strength to encode data - Accurate answers AM (Amplitude Modulation) altering the starting point of a wave form to encode data - Accurate answers PM (Phase Modulation) altering the cycles per second of a wave form to encode data - Accurate answers FM (Frequency Modulation) combining multiple signals onto a wire/cable by using multiple frequency bands - Accurate answers FDM (Frequency Division Multiplexing) combining multiple signals onto a wire/cable by using multiple time slots - Accurate answers TDM (Time Division Multiplexing) combining multiple signals onto a wire/cable by using multiple wavelengths of light - Accurate answers WDM (Wired Division Multiplexing) K or kilo equals - Accurate answers Thousand M or mega equals - Accurate answers Million G or giga equals - Accurate answers Billion T or tera equals - Accurate answers Trillion 75 Ohm, 18AWG, solid core coax cable - typically used for broadband internet service and cable TV - Accurate answers RG- 50 Ohm, 10AWG, 10Base5 coax cable - used for first Ethernet Networks and typically called Thicknet - Accurate answers RG- 50 Ohm, 24AWG, 10Base2 coax cable - used for Ethernet Networks in the 1980's and typically called Thinnet - Accurate answers RG- BNC or F-Type connector - Accurate answers Connector Used for Coaxial Cable -10 Mbps - Designed for use with 10 Mbps Ethernet or 16 Mbps token ring - paired cable, but little to no twisting for cancellation -100 Mbps - Required for Fast Ethernet (100 Mbps) - paired cable that is twisted for cancellation -1000 Mbps - Similar to Cat 5 but better quality cable and higher twist pitch (tighter twists for better cancellation) provides better EMI protection -10 Gbps - cables often include a solid plastic core that keeps the twisted pairs separated and prevents the cable from being bent too tightly -10 Gbps - cables often include shielding around all pairs for better shielding from cross-talk and interference -10 Gbps - Each wire pair is shielded ... and ... there is shielding right under the cable jacket that is around all 4 wire pairs. Different type of connector is used -40 Gbps - 100 Gbps - ISO Standards are still being drafted - Accurate answers -Cat 3
a type of fiber optic that is designed to transmit data using multiple "rays" of light typical size of 50/125um or 62.5/125um - Accurate answers MMF (Multimode Fiber) ST, SC, LC, FC or MTRJ Connector - Accurate answers Connector Used for Fiber Optic Cable Fast Ethernet MMF half-duplex segment length of 412m full-duplex segment length of 2000m - Accurate answers 100Base-FX Gigabit Ethernet SMF or MMF 1300 nm wavelength light source MMF distance can reach 550m SMF distance can reach 5000 meters - Accurate answers 1000Base-LX Gigabit Ethernet MMF 850 nm wavelength light source distance can reach 550 meters - Accurate answers 1000Base-SX 10 Gigabit Ethernet MMF 850 nm wavelength light source distances up to 300 meters - Accurate answers 10GBase-SR and 10GBase-SW 10 Gigabit Ethernet SMF 1310 nm wavelength light source distances can reach 10,000 meters - Accurate answers 10GBase-LR and 10GBase-LW 10 Gigabit Ethernet SMF 1550 nm wavelength light source distances can reach 40,000 meters - Accurate answers 10GBase-ER and 10GBase-EW noise/interference caused by electrical devices or wires carrying electrical signals - Accurate answers EMI (Electromagnetic Interference) noise/interference caused by strong broadcast signals from a radio or TV station - Accurate answers RFI (Radio Frequency Interference) the weakening of a signal over a distance as the signal propagates - Accurate answers Attenuation the brief delay it takes for a signal to propagate the length of a cable - Accurate answers Latency cross-talk that occurs between 2 cables - Accurate answers Alien cross-talk
cross-talk that occurs between wire pairs near the source of a signal - Accurate answers NEXT cross-talk that occurs between wire pairs at the far end of the cable from the signal source - Accurate answers FEXT If you are trying to locate where a specific unlabeled wire (or wire pair) is terminated in a data closet a ___________ can be used to help locate the wire (or wire pair) termination - Accurate answers Toner & Probe A ____________ can be used to take voltage and resistance measurements to help locate the cause of interference or a short circuit - Accurate answers Multimeter A ____________ can be used to check if a network patch cable is functioning correctly and usable or their is a fault in the cable - Accurate answers Continuity Tester A ____________ can be used to verify if the installed network cabling is performing to the desired TIA performance level - Accurate answers Cable Certifier Most WLANs utilize frequencies around 2.4 GHz or 5 GHz to send and receive wireless signals - Accurate answers True Networks that transmit signals through the air via radio frequency (RF) waves are known as ____________ - Accurate answers WLANs Wired and Wireless signals share many similarities, including the use of the same Layer 3 and above protocols - Accurate answers True All wireless signals are carried through the air by electromagnetic waves. The wireless spectrum is a continuum of the electromagnetic waves used for data and voice communications - Accurate answers True The wireless spectrum (as defined by the FCC) spans frequencies between _____ and _______ - Accurate answers 9kHz and 300GHz In the United States, the collection of frequencies available for communication - known as "the airwaves" - is considered a natural resource available for public use. The ____ grants organizations in different locations exclusive rights to use each frequency - Accurate answers FCC The _____ is a United Nations agency that sets standards for international wireless services, including frequency allocation, signaling and protocols used by wireless devices; wireless transmission and reception equipment; satellite orbits and so on - Accurate answers ITU An antenna's ___________________ describes the relative strength over a three-dimensional area of all the electromagnetic energy the antenna sends or receives - Accurate answers Radiation Pattern used when a source needs to communicate with one destination - point-to-point link - Accurate answers directional antenna
In addition to connecting multiple nodes within a LAN, wireless technology can be used to connect 2 different parts of a LAN or 2 seperate LANs. Such connections typically use a fixed link with directional antennas between 2 access points - Accurate answers True WLANs work at OSI Layers ______. They support the same TCP/IP higher-layer OSI protocols and operating systems (Windows, Unix, Linux, Apple) as wired LANs - Accurate answers 1 and 2 Collectively the 802.11 standards and their amendments, extensions, and corrections are known as Wi- Fi, which stands for Wireless Fidelity - Accurate answers True Freq Range - 2.4 GHz Max Throughput - 11 Mbps Effective Throughput - 5 Mbps Average Range - 100m - Accurate answers 802.11b Freq Range - 5 GHz Max Throughput - 54 Mbps Effective Throughput - 11-18 Mbps Average Range - 20m - Accurate answers 802.11a Freq Range - 2.4 GHz Max Throughput - 54 Mbps Effective Throughput - 20-25 Mbps Average Range - 100m - Accurate answers 802.11g Freq Range - 2.4 GHz or 5 GHz Max Throughput - 65-600 Mbps Effective Throughput - 65-500 Mbps Average Range - 400m - Accurate answers 802.11n Freq Range - 5 GHz Max Throughput - 1.3 Gbps Effective Throughput - 561 Mbps per client Average Range - Unknown at this point - Accurate answers 802.11ac IEEE 802.11 standards specify the use of CSMA/CA in WLANs for data to be placed on a shared medium (on the network) - Accurate answers True The use of ACK packets to verify every transmission means that 802.11 networks require more overhead than 802.3 networks - Accurate answers True In reality, most wireless networks tend to achieve between 1/3 and 1/2 of their theoretical maximum throughput. (Example: 802.11g network is rated for a maximum of 54 Mbps; most 802.11g networks achieve between 20 and 25 Mbps.) - Accurate answers True
WLANs can use the optional RTS/CTS protocol. The source node sends a RTS signal to the access point requesting the exclusive opportunity to transmit. If the access point agrees to the RTS request it will respond with a CTS and will temporarily suspend communication through the access point and wait for the source node to complete transmission - Accurate answers True the station transmits a special frame, known as a probe, on all available channels within its frequency range - Accurate answers Active Scanning the station listens on all channels within its frequency range for a special signal, known as a becon frame, issued from an access point - Accurate answers Passive Scanning The ______ is a unique character string used to identify an access point - Accurate answers SSID (Service Set Identifier) a group of stations that share an access point - Accurate answers BSS (Basic Service Set) the identifier for the group of stations that share the same access point - Accurate answers BSSID (Basic Service Set Identifier) a group of access points connected to the same LAN - Accurate answers ESS (Extended Service Set) BSSs that belong to the same ESS share a special identifier - Accurate answers ESSID (Extended Service Set Identifier) frames related to medium access and data delivery - such as ACK and RTS/CTS - Accurate answers Control Frame frame involved in association and reassociation - such as probe and becon - Accurate answers Management Frame frames involved in carrying the data between stations - Accurate answers Data Frames When comparing 802.3 and 802.11 data frames: Viewing the 802.3 data frame, its significant overhead - that is, the large quantities of fields added to the data field - become apparent - Accurate answers False the MAC addresses of the sending node and receiving node - Accurate answers source address & destination address fields the MAC addresses of the access points on the wireless network - Accurate answers transmitter address & receiver address fields used to indicate how a large packet is fragmented - Accurate answers sequence control field holds information about the protocol in use, the type of frame being transmitted, whether the frame is part of a larger, fragmented packet, whether the frame is one that was reissued, what type of security the frame uses, etc.... - Accurate answers frame control field
software tool that can assess the quality of the wireless signal - helps with identifying where interference is greatest - Accurate answers spectrum analyzer