Intro To Networking Midterm Exam Prep

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Timlem
T
Timlem
Community Contributor
Quizzes Created: 1 | Total Attempts: 917
| Attempts: 917 | Questions: 106
Please wait...
Question 1 / 106
0 %
0/100
Score 0/100
1. The global Internet would be considered a _________?

Explanation

The global Internet would be considered a WAN, which stands for Wide Area Network. A WAN is a network that spans a large geographical area and connects multiple smaller networks together. The global Internet fits this definition as it is a vast network that connects computers and devices from all over the world, allowing them to communicate and share information.

Submit
Please wait...
About This Quiz
Intro To Networking Midterm Exam Prep - Quiz

This Intro to Networking Midterm Exam Prep quiz assesses key networking concepts, including DHCP configuration, cable selection for optimal transmission, and usage of network utilities like Netstat. It... see moreis designed to enhance practical understanding and application of networking principles, ideal for students or professionals in IT fields. see less

2. The ISO defined the OSI model to create a standardized approach to network communications and break up the process into clearly defined steps. The layered approach allowed for modular engineering and multi-vendor interoperability. How many layers were defined in the OSI model?

Explanation

The OSI model defined seven layers in order to create a standardized approach to network communications. This layered approach allowed for modular engineering and multi-vendor interoperability. Each layer has its own specific function and interacts with the layers above and below it in a hierarchical manner. By breaking up the process into clearly defined steps, the OSI model provides a framework for understanding and troubleshooting network communication.

Submit
3. The application, presentation and session layers can be grouped together and referred to as the _____________ layers.

Explanation

The application, presentation, and session layers can be grouped together and referred to as the upper layers. These layers are responsible for managing the communication between the end-user and the network. They handle tasks such as data formatting, encryption, session management, and application-specific protocols. By grouping these layers together as the upper layers, it distinguishes them from the lower layers, which are responsible for more basic functions such as routing and physical transmission of data.

Submit
4. A ___________________ is a temporary storage location in memory used by many protocols to help reduce unnecessary network traffic and speed up processing and overall network communications.

Explanation

A cache is a temporary storage location in memory used by many protocols to help reduce unnecessary network traffic and speed up processing and overall network communications. It stores frequently accessed data closer to the processor, allowing for faster retrieval and reducing the need to fetch data from the main memory or external storage. This helps in improving the overall performance of the system by reducing latency and increasing data access speed.

Submit
5. Using a 3-way handshake to establish a connection-oriented session ____________ is the protocol used to guarantee delivery of segments at the transport layer.

Explanation

Using a 3-way handshake to establish a connection-oriented session is a characteristic of the TCP (Transmission Control Protocol). TCP ensures the reliable delivery of segments at the transport layer by using sequence numbers, acknowledgments, and retransmissions. This protocol guarantees that data sent from one device to another will be received accurately and in the correct order. UDP (User Datagram Protocol) is a connectionless protocol that does not provide the same level of reliability as TCP. IP (Internet Protocol) is responsible for routing packets across networks, while SIP (Session Initiation Protocol) is used for establishing and terminating multimedia sessions.

Submit
6. UDP does not guarantee delivery of segments in any form and is therefore known as a ________________________ protocol.

Explanation

UDP (User Datagram Protocol) does not guarantee the delivery of segments, meaning that it does not ensure that the data sent from one host will reach the destination host. This lack of guarantee makes UDP a connectionless protocol, as it does not establish a formal connection between the sender and receiver. Unlike TCP (Transmission Control Protocol), which provides reliability through acknowledgments and retransmissions, UDP is used when speed and efficiency are more important than data integrity. Therefore, the correct answer is "connectionless."

Submit
7. How many bits is an IPv4 address?

Explanation

An IPv4 address is composed of 32 bits. This means that it is represented by a sequence of 32 binary digits (0s and 1s). Each bit in the address can have two possible values, 0 or 1, giving a total of 2^32 (or approximately 4.3 billion) unique addresses. This is the reason why IPv4 addresses are often referred to as 32-bit addresses.

Submit
8. The wireless standards used for WLANs are known as ________________.

Explanation

The correct answer is 802.11 because it refers to the set of wireless networking standards used for WLANs (Wireless Local Area Networks). These standards define the protocols and technologies that enable wireless communication between devices within a limited area. 802.11 is widely used for wireless internet access in homes, offices, and public spaces, providing reliable and fast connectivity.

Submit
9. Providing both logical addressing and routing functions the _______________ layer is most associated with the IP protocol and routing hardware.

Explanation

The network layer is the correct answer because it is responsible for logical addressing and routing functions. This layer is closely associated with the IP protocol and routing hardware, which are essential components for establishing connections and routing data across networks. The network layer ensures that data packets are properly addressed and routed to their intended destinations, enabling communication between different networks.

Submit
10. A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?

Explanation

CAT5e should be purchased because it is capable of supporting a transmission rate of 1Gbps. Coaxial and CAT3 cables are not capable of achieving this speed.

Submit
11. The primary network architecture used on LANs today is ___________________, coming in many versions it defines the cable and cabling topology as well as the media access method used to get a signal on the media.

Explanation

Ethernet is the primary network architecture used on LANs today. It comes in many versions and defines the cable and cabling topology as well as the media access method used to get a signal on the media.

Submit
12. A network in which all systems are equal and can share and access resources without a central controlling authority would be considered a ________________ network.

Explanation

A network in which all systems are equal and can share and access resources without a central controlling authority would be considered a peer to peer network. In this type of network, each device can act as both a client and a server, allowing for direct communication and resource sharing between devices without the need for a centralized server. This decentralized structure provides increased flexibility and resilience, as there is no single point of failure.

Submit
13. The transport of choice for streaming audio and video is _____________ because of its speed and efficiency due to its lack of overhead and very simple header.

Explanation

UDP (User Datagram Protocol) is the correct answer because it is the transport of choice for streaming audio and video. UDP is preferred over TCP (Transmission Control Protocol) because it offers faster and more efficient communication. UDP lacks the overhead and complexity of TCP, making it suitable for real-time applications like streaming media where speed and efficiency are crucial. Additionally, UDP's simple header structure allows for faster processing and delivery of data packets.

Submit
14. Every device has a direct connection (physically or virtually) to every other device you end up with a _____________ network.

Explanation

A mesh network is formed when every device in the network is directly connected to every other device, either physically or virtually. This means that there are multiple paths for data to travel, increasing reliability and redundancy. In a mesh network, devices can communicate with each other directly, without relying on a central hub or a single point of failure. This makes mesh networks suitable for large-scale deployments and environments where connectivity is critical.

Submit
15. Including the logical source and destination addressing a _________________ is created by the IP protocol at the network layer and is one of the more common terms for referencing data flowing through a network.

Explanation

In networking, data is divided into smaller units called packets at the network layer. These packets contain the logical source and destination addressing information, allowing them to be routed through the network. Therefore, the correct term for referencing data flowing through a network is "packet".

Submit
16. For every predetermined amount of data TCP sends the receiving station will send an _____________________ to let the source system know what it is expecting next.

Explanation

When TCP sends a predetermined amount of data, the receiving station will send an acknowledgment to let the source system know what it is expecting next. This acknowledgment serves as a confirmation that the data has been successfully received and indicates the next expected frame or data sequence. This helps ensure reliable and orderly data transmission between the sender and receiver in TCP/IP communication.

Submit
17. _____________________ IP addressing can be labor intensive and error prone, and often only undertaken by a network administrator in small network installations where the manual addition of IP address information is relatively straight-forward.

Explanation

Static IP addressing is the correct answer because it refers to the method of assigning a fixed IP address to a device on a network. This means that the IP address does not change and remains constant, which can be beneficial in certain situations. It is mentioned in the explanation that IP addressing can be labor intensive and error prone, indicating that manually adding IP address information is a time-consuming task. Therefore, using static IP addressing can simplify the process, especially in small network installations where the addition of IP address information is relatively straightforward.

Submit
18. A one to everyone communication is known as a ______________________ and even on a switched network all connected and active hosts will receive and process the message. This type of communication will continue flowing through the network until reaching a router at which point it is stopped.

Explanation

A one to everyone communication is known as a broadcast and even on a switched network all connected and active hosts will receive and process the message. This type of communication will continue flowing through the network until reaching a router at which point it is stopped.

Submit
19. UTP wires are twisted in pairs to help reduce the effects of this interference.

Explanation

UTP wires are twisted in pairs to help reduce the effects of cross-talk. Cross-talk is a phenomenon in which signals from one wire interfere with signals on adjacent wires, causing distortion or loss of data. By twisting the wires in pairs, the electromagnetic fields generated by each wire cancel each other out, minimizing the cross-talk. This helps to ensure that the signals transmitted through the UTP wires remain clear and free from interference.

Submit
20. At which of the following layers does the TCP protocol operate?

Explanation

The TCP (Transmission Control Protocol) operates at Layer 4 of the OSI model, which is the Transport Layer. This layer is responsible for establishing and maintaining reliable end-to-end connections between hosts, ensuring the ordered and error-free delivery of data packets. TCP provides features like flow control, congestion control, and error detection to ensure reliable transmission of data over IP networks.

Submit
21. Which of the following is a secure method of remote access via command line?

Explanation

SSH (Secure Shell) is a secure method of remote access via command line. Unlike Telnet, RCP, and RSH, SSH provides encryption and authentication, ensuring that the connection between the client and the server is secure. It uses cryptographic techniques to protect the data transmitted over the network, making it a reliable and secure method for remote access and management of systems.

Submit
22. Which of the following logical network topologies is used to provide a secure connection across the Internet?

Explanation

A VPN (Virtual Private Network) is used to provide a secure connection across the Internet. It creates a private network over a public network, such as the Internet, allowing users to securely access and transmit data. VPNs use encryption and tunneling protocols to ensure that data is protected and secure from unauthorized access. This makes VPNs an ideal choice for organizations or individuals who need to connect to a network remotely while maintaining privacy and security.

Submit
23. L2TP and PPTP are protocols associated with what service?

Explanation

L2TP (Layer 2 Tunneling Protocol) and PPTP (Point-to-Point Tunneling Protocol) are both protocols that are commonly used in VPN (Virtual Private Network) services. VPNs allow users to securely connect to a private network over a public network, such as the internet. L2TP and PPTP are used to establish and maintain the secure tunnel between the user's device and the VPN server, ensuring that data transmitted over the connection remains encrypted and protected from unauthorized access. Therefore, the correct answer is VPN.

Submit
24. In which of the following layers of the OSI model does the TCP protocol operate?

Explanation

The TCP protocol operates in the Transport layer of the OSI model. The Transport layer is responsible for ensuring reliable communication between end systems. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data packets. It handles the segmentation, reassembly, and flow control of data, ensuring that data is delivered accurately and efficiently.

Submit
25. A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?

Explanation

The Address Resolution Protocol (ARP) would provide the needed information. ARP is used to map an IP address to a MAC address on a local network. In this case, the network technician can use ARP to obtain the MAC address of the workstation with the IP address 192.168.1.45, which will help identify the workstation's packets in the packet analyzer.

Submit
26. One of the primary functions of the Transport layer __________________, performed by both TCP and UDP, is the process of breaking up data from the Application layer into acceptable sized pieces that will be able to fit onto the underlying network infrastructure.

Explanation

The correct answer is segmentation. The Transport layer, performed by both TCP and UDP, breaks up data from the Application layer into acceptable sized pieces called segments. This is necessary to ensure that the data can fit onto the underlying network infrastructure. Segmentation allows for efficient transmission and reassembly of data packets, improving the overall reliability and performance of the network communication.

Submit
27. An administrator replaced a router with a switch. End users are able to access network shares but are not able to access the Internet. Which of the following is the BEST explanation why the users are unable to access the Internet?

Explanation

A switch is a networking device that connects devices within a local network, while a router is responsible for routing traffic between different networks. In this scenario, the administrator replaced the router with a switch, which means that the switch is not capable of routing traffic between the local network and the Internet. Therefore, the users are unable to access the Internet because the switch does not have the functionality to route traffic to the Internet.

Submit
28. Logical addressing today is pretty much exclusively represented by ___________________.

Explanation

Logical addressing today is pretty much exclusively represented by IP address. This is because IP (Internet Protocol) address is used to identify and locate devices within a network. It provides a unique numerical label to each device, allowing them to communicate and exchange data over the internet. MAC address is a hardware address used at the data link layer, HTTP address is a protocol used for web communication, and ARP address is used for mapping IP addresses to MAC addresses. However, when it comes to logical addressing, IP address is the primary and widely used method.

Submit
29. The ________________ layers of the OSI model including Datalink and Physical take care of the physical addressing of host to host communications as well as encoding the 1's and 0's into some form of current, pulse or signal onto the media.

Explanation

The lower layers of the OSI model, including the Datalink and Physical layers, are responsible for the physical addressing of host to host communications. They also handle the encoding of 1's and 0's into some form of current, pulse, or signal onto the media. These layers deal with the actual transmission of data over the physical network, ensuring that the data is properly encoded and transmitted to the intended destination.

Submit
30. The combination of an IP address and a port number known as a ___________________ is how specific services on specific servers are identified. For example 172.16.10.10:80 would identify a system with an IP address of 172.16.10.10 who is hosting a web site.

Explanation

A socket is the combination of an IP address and a port number that is used to identify specific services on specific servers. It allows communication between different systems over a network. In the given example, 172.16.10.10:80 represents a system with the IP address 172.16.10.10 hosting a web site, with port 80 being used for web traffic.

Submit
31. Two types of interference that can interfere with UTP based network communication signals are _______________ and ________________. (choose 2)

Explanation

EMI (Electromagnetic Interference) and RFI (Radio Frequency Interference) are two types of interference that can disrupt UTP (Unshielded Twisted Pair) based network communication signals. EMI is caused by electromagnetic radiation from various sources such as power lines, motors, and fluorescent lights. It can introduce noise and distort the signals, leading to data corruption and communication errors. RFI, on the other hand, is caused by radio frequency signals from devices like cell phones, radios, and wireless networks. These signals can interfere with the UTP signals, causing degradation in the quality and performance of the network communication.

Submit
32. Which secure command line utility is used for remote management of a cisco router or switch?

Explanation

SSH (Secure Shell) is the correct answer because it is a secure command line utility used for remote management of a Cisco router or switch. Telnet is not secure as it transmits data in plain text, making it vulnerable to eavesdropping. RDP (Remote Desktop Protocol) is used for remote desktop access, not specifically for managing Cisco devices. CISC is not a command line utility or a protocol used for remote management.

Submit
33. It's impossible for a system to communicate directly with a destination system that is on a different network. How can systems on different networks share information?

Explanation

Systems on different networks share information by sending their data through their default gateways, which are local routers. These routers act as intermediaries, forwarding the data between the different networks. When a system wants to communicate with a destination on a different network, it sends the data to its default gateway, which then routes it to the appropriate destination network. This allows systems on different networks to communicate and share information effectively.

Submit
34. What does a system need before they can communicate directly with another system on the same network?

Explanation

Before a system can communicate directly with another system on the same network, it needs the destination MAC address. The MAC address is a unique identifier assigned to each network interface card (NIC) and is used to identify and communicate with specific devices on a local network. By knowing the destination MAC address, a system can send data packets directly to the intended recipient on the same network.

Submit
35. Made up of the first 3 bytes (24 bits) of the MAC address the ________________ uniquely identifies the manufacturer of the NIC or interface that the address is assigned to.

Explanation

The OUI (Organizationally Unique Identifier) is made up of the first 3 bytes (24 bits) of the MAC address. It uniquely identifies the manufacturer of the NIC (Network Interface Card) or interface that the address is assigned to. This identifier helps in identifying the specific company or organization responsible for producing the network device.

Submit
36. MAC or physical addresses are divided into two parts. The second part is just a unique number assigned to each component coming off the assembly line. The first part of the MAC is known as the OUI and is used for which of the following?

Explanation

The first part of the MAC address, known as the OUI (Organization Unique Identifier), is used to identify the manufacturer of the component. It is a unique number assigned to each component coming off the assembly line, allowing the identification of the manufacturer. This information is useful in various networking scenarios, such as troubleshooting, inventory management, and ensuring compatibility between different components.

Submit
37. Which of the following processes translates a private IP address for a public IP address?

Explanation

NAT (Network Address Translation) is the process that translates a private IP address to a public IP address. It allows multiple devices on a private network to share a single public IP address when communicating with devices on the internet. NAT modifies the IP header of outgoing packets, replacing the private IP address with the public IP address, and vice versa for incoming packets, enabling communication between the private and public networks. DNS (Domain Name System) is responsible for translating domain names to IP addresses, DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network, and PAT (Port Address Translation) is a variant of NAT that translates both IP addresses and port numbers.

Submit
38. In the data encapsulation process the PDU created at the Transport layer is commonly called a ____________________.

Explanation

In the data encapsulation process, the PDU created at the Transport layer is commonly called a segment.

Submit
39. Paying a usage fee to leverage a larger corporations excess network resources to offer services to your own network users and clients (as opposed to purchasing/setting up/configuring the necessary hardware yourself) would be an example of ______________________.

Explanation

Paying a usage fee to leverage a larger corporation's excess network resources to offer services to your own network users and clients aligns with the concept of cloud computing. In cloud computing, resources such as storage, servers, and software are provided over the internet on a pay-as-you-go basis, eliminating the need for organizations to invest in and maintain their own hardware infrastructure. This allows businesses to scale their operations quickly and efficiently while focusing on their core competencies.

Submit
40. This device breaks up collision domains and keeps track of what device or devices are connected to each port.

Explanation

A switch is a networking device that breaks up collision domains, which allows for more efficient communication between devices on a network. It also keeps track of what device or devices are connected to each of its ports, allowing for better management and control of network traffic. Unlike a hub, which simply broadcasts data to all connected devices, a switch intelligently directs data only to the device it is intended for, improving network performance and security. A router, on the other hand, is responsible for connecting different networks together, while a WAP is a wireless access point used for connecting wireless devices to a network. A console typically refers to a device used for managing and configuring network devices.

Submit
41. Required to make an IP address meaninful, the _________________ hides the host portion of an IP address allowing hosts to determine if a destination is local (on the same network segment) or remote (beyond the local router) so they know which MAC address will be needed to forward the frame.

Explanation

The subnet mask hides the host portion of an IP address, allowing hosts to determine if a destination is local or remote. By comparing the subnet mask of the host with the destination IP address, the host can determine if the destination is on the same network segment or beyond the local router. This information is important because hosts need to know the MAC address of the destination in order to forward the frame correctly.

Submit
42. What does the tracert utility mostly help with?

Explanation

The tracert utility is primarily used for troubleshooting routers. It helps in identifying the path taken by data packets from the source to the destination by sending out ICMP echo requests with incrementing TTL values. By analyzing the response time and the routers encountered along the way, network administrators can pinpoint any issues or bottlenecks in the network infrastructure. This makes tracert a valuable tool for diagnosing and resolving router-related problems.

Submit
43. The ____________ protocol provides error messaging for IP communications as well as a handy echo request / reply mechanism used by the ping utility to verify connectivity on the network.

Explanation

ICMP (Internet Control Message Protocol) is the correct answer. ICMP is a protocol that provides error messaging for IP communications. It is also used by the ping utility to send echo request messages and receive echo reply messages, which helps in verifying connectivity on the network. The ping utility sends an ICMP echo request message to a destination IP address and waits for an ICMP echo reply message from the destination. This mechanism is commonly used to troubleshoot network connectivity issues.

Submit
44. The Internet is no longer just made up of files to upload or download or web sites to visit. Today home and business security systems connect to the Internet and can notify mobile devices as events happen, Cities can control their power grid and traffic light environments to optimize their use, lighting, appliances, store inventory systems and many more things all are interconnected creating what some call _____________________________.

Explanation

The given correct answer is "the Internet of Things". This term refers to the network of physical devices, vehicles, appliances, and other objects that are embedded with sensors, software, and connectivity, enabling them to connect and exchange data. It encompasses the idea that various devices and systems can communicate with each other through the internet, allowing for automation, data collection, and improved efficiency in various aspects of life and industries.

Submit
45. What information can the Netstat command line utility provide?

Explanation

The Netstat command line utility can provide information about all open connections on a system, including the protocols and ports being used. This can be useful for troubleshooting network connectivity issues or identifying any unauthorized connections. It does not verify local and remote connectivity, identify routers, or display IP address configuration information.

Submit
46. This device breaks up broadcast domains and keeps track of and connects networks together.

Explanation

A router is a device that breaks up broadcast domains and keeps track of and connects networks together. Unlike a hub or switch, which simply forwards data to all connected devices, a router examines the destination IP address of each packet and determines the best path for it to reach its destination. This allows different networks to communicate with each other and enables the routing of data between them. A bridge is similar to a switch but operates at the data link layer, not the network layer, so it does not perform the same routing functions as a router. A console is a device used for managing and configuring network devices, but it does not break up broadcast domains or connect networks together.

Submit
47. Who would the following destination MAC address be sent to by a switch? FF:FF:FF:FF:FF:FF

Explanation

The destination MAC address FF:FF:FF:FF:FF:FF is the broadcast address, which means it is sent to all devices on the local network. Broadcast messages are intended to be received by every device on the network, so the switch would forward this message to everyone on the local network.

Submit
48. In order for computers with private IP addresses to access the public Internet, which of the following must the router perform?

Explanation

The router must perform Network Address Translation (NAT) in order for computers with private IP addresses to access the public Internet. NAT allows the router to translate the private IP addresses of the computers into a single public IP address that can be recognized and routed on the Internet. This allows multiple devices on a private network to share a single public IP address, conserving IP address space and providing a level of security by hiding the private IP addresses from the public network.

Submit
49. A one to a group communication known as a ___________________ is used to share data with only those systems that are running the same application or service and thus are part of a specific group of systems.

Explanation

Multicast is the correct answer because it refers to a one-to-a-group communication where data is shared with systems running the same application or service. In multicast, the data is sent to a specific group of systems, allowing them to receive and process the information simultaneously. This method is efficient for distributing data to multiple recipients, reducing network traffic and improving overall performance.

Submit
50. Large networks that span borders and are made up of hunderds of systems are known as Enterprise networks while a business network with only a few computer systems or a one that runs out of the business owners home is commonly referred to as a _______________ network.

Explanation

A business network with only a few computer systems or one that runs out of the business owner's home is commonly referred to as a SOHO (Small Office/Home Office) network.

Submit
51. Which three of the following protocols are associated with email? (choose 3)

Explanation

SMTP (Simple Mail Transfer Protocol), POP3 (Post Office Protocol version 3), and IMAP4 (Internet Message Access Protocol version 4) are all protocols associated with email. SMTP is responsible for sending emails from the client to the server, POP3 is used for retrieving emails from the server to the client, and IMAP4 is used for accessing and managing emails on a remote mail server. SNMP, HTTPS, and NTP are not directly related to email protocols.

Submit
52. Which of the following ports does POP3 services use, by default?

Explanation

POP3 (Post Office Protocol version 3) is a protocol used for receiving email messages from a mail server. By default, POP3 services use port 110. This port is specifically designated for POP3 communication, allowing clients to connect to the mail server and retrieve their emails. Port 25 is used for SMTP (Simple Mail Transfer Protocol), which is responsible for sending emails. Port 143 is used for IMAP (Internet Message Access Protocol), another protocol for receiving emails. Port 443 is used for HTTPS (Hypertext Transfer Protocol Secure), which is a secure version of HTTP used for encrypted communication.

Submit
53. A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?

Explanation

To allow the new employees access to the wireless network, additional WAPs (Wireless Access Points) should be installed. This is because the existing WAPs may not have enough coverage or capacity to accommodate the increased number of users. By installing additional WAPs, the network will be able to handle the increased demand and provide reliable and efficient wireless connectivity to all 50 new employees.

Submit
54. For modern long distance, high-bandwidth installations you would most likely use ________________ cabling.

Explanation

For modern long distance, high-bandwidth installations, single-mode fiber cabling would be the most suitable choice. Single-mode fiber has a smaller core, allowing for a single beam of light to travel through it, resulting in less signal loss and higher bandwidth capabilities. This makes it ideal for long-distance transmissions and high-speed data transfer. UTP (Unshielded Twisted Pair) cabling is commonly used for shorter distances and lower bandwidth requirements. Dark fiber refers to unused or unlit optical fiber, which requires additional equipment to be installed. Backbone coaxial is an older technology that is less commonly used for modern high-bandwidth installations.

Submit
55. The unit of data produced at the lower layers of the OSI model is called a _____________ and contains the physical addressing needed for local communications on a network.

Explanation

In the OSI model, the unit of data produced at the lower layers is called a frame. A frame contains the physical addressing information required for local communications on a network. Frames are responsible for encapsulating data packets and adding necessary control information such as synchronization bits, error detection, and flow control.

Submit
56. Collaboration software could best be defined or described as ___________________.

Explanation

not-available-via-ai

Submit
57. Which of the following devices separates a LAN segment into two collision domains, without affecting the broadcast domain?

Explanation

A bridge is a device that separates a LAN segment into two collision domains without affecting the broadcast domain. It does this by examining the MAC addresses of the frames passing through it and forwarding them only to the appropriate segment. By doing so, it reduces collisions and improves network performance within each segment. Unlike a router, a bridge operates at the data link layer of the OSI model and does not create separate broadcast domains. A firewall is a security device that filters network traffic, and a repeater simply amplifies and extends the signal.

Submit
58. Which of the following is a hybrid network topology used for fault tolerance, in which all computers MUST connect to each other?

Explanation

A mesh network topology is a type of network configuration where each computer or device is connected to every other device in the network. This ensures fault tolerance as if one connection fails, there are multiple alternate paths for data transmission. This redundancy provides high reliability and fault tolerance, making mesh topology suitable for critical systems where uninterrupted connectivity is crucial.

Submit
59. Which of the following is a key rule concerning subnet masks?

Explanation

A key rule concerning subnet masks is that the binary 0's must all be together at the end of the address. This means that the subnet mask should consist of a continuous sequence of 1's followed by a continuous sequence of 0's. This rule is important because it helps to identify the network portion and the host portion of an IP address. The 1's represent the network portion, while the 0's represent the host portion. By following this rule, devices can determine which network an IP address belongs to and properly route the network traffic.

Submit
60. What is required to make sense of an IP address or to make it useful?

Explanation

A subnet mask is required to make sense of an IP address or to make it useful. A subnet mask is used to divide an IP address into network and host portions, allowing devices to determine if they are on the same network or if they need to communicate through a router. It helps in identifying the network address and the host address within a given IP address. Without a subnet mask, it would be difficult to determine the network boundaries and properly route the traffic.

Submit
61. This port is used to create an initial configuration on a Cisco router or switch.

Explanation

The console port is used to create an initial configuration on a Cisco router or switch. It provides a direct connection to the device for configuration purposes and is typically accessed using a console cable. This port allows administrators to configure the device before it is connected to a network, making it an essential tool for initial setup and troubleshooting.

Submit
62. When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?

Explanation

When the DHCP server is unavailable for a network, PCs will attempt to configure their NICs using APIPA (Automatic Private IP Addressing). APIPA allows PCs to automatically assign themselves a private IP address within a specific range (169.254.0.1 to 169.254.255.254) when a DHCP server is not available. This allows the PCs to continue communicating on the network using a self-assigned IP address until the DHCP server becomes available again.

Submit
63. The PDU created at the Internet layer of the TCP/IP 4 layer model is called ___________________.

Explanation

The PDU created at the Internet layer of the TCP/IP 4 layer model is called a packet. This is because at the Internet layer, data is divided into smaller units called packets before being transmitted over the network. These packets contain the necessary information such as source and destination IP addresses, as well as the actual data being transmitted. Therefore, a packet is the correct term for the PDU created at the Internet layer.

Submit
64. What command will display your cache of IP to MAC address name resolutions?

Explanation

The correct answer is "arp -a". The "arp -a" command displays the cache of IP to MAC address name resolutions. ARP (Address Resolution Protocol) is used to map an IP address to a MAC address on a local network. By using the "arp -a" command, you can view the current mapping of IP addresses to MAC addresses in your cache.

Submit
65. Looking at the following address, identify what class address it is: 126.128.255.99 255.255.255.0

Explanation

The given IP address 126.128.255.99 falls within the range of Class A addresses. In Class A, the first octet is used to identify the network, while the remaining three octets are used for host addresses. The range for Class A addresses is from 1.0.0.0 to 126.0.0.0. Therefore, based on the given IP address, it can be concluded that it belongs to Class A.

Submit
66. What type of address is the following? 169.254.73.244 255.255.0.0

Explanation

The given IP address 169.254.73.244 falls within the range of APIPA (Automatic Private IP Addressing) addresses. APIPA is a feature in Windows operating systems that allows devices to automatically assign themselves an IP address when they are unable to obtain one from a DHCP server. These addresses are typically used for local network communication and cannot be routed on the internet. Therefore, the correct answer is APIPA.

Submit
67. The standard topology used on UTP switch based networks is a ____________.

Explanation

The standard topology used on UTP switch based networks is a star. In a star topology, all devices are connected to a central switch or hub. This allows for easy management and troubleshooting as each device has its own dedicated connection to the central switch. It also provides better performance and reliability since a failure in one device does not affect the rest of the network.

Submit
68. HTTPS uses secure sockets layer over TCP on port __________ to ensure that nobody on the Internet can see any private transaction information.

Explanation

HTTPS uses secure sockets layer over TCP on port 443 to ensure that nobody on the Internet can see any private transaction information. The secure sockets layer provides encryption and authentication to establish a secure connection between the client and the server. Port 443 is the default port for HTTPS communication, and it is specifically reserved for secure HTTP traffic. Using this port ensures that the communication between the client and server is encrypted and protected from unauthorized access or interception.

Submit
69. What IP helper protocol is used by both the Ping and Tracert utilities to perform their jobs?

Explanation

ICMP (Internet Control Message Protocol) is the correct answer. ICMP is used by both the Ping and Tracert utilities to perform their jobs. Ping uses ICMP Echo Request messages to check if a remote host is reachable, while Tracert uses ICMP Time Exceeded messages to trace the route packets take to reach a destination. ICMP is a network protocol that allows devices to send error messages and operational information about the network. It is commonly used for diagnostic and troubleshooting purposes in network communication.

Submit
70. The media access method used by Ethernet networks is ___________________.

Explanation

CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is the media access method used by Ethernet networks. In CSMA/CD, devices on the network listen to the medium before transmitting data. If the medium is idle, the device can transmit. However, if two devices transmit at the same time and a collision occurs, both devices detect the collision and stop transmitting. They then wait for a random amount of time before retransmitting, reducing the chances of another collision. This method allows for efficient sharing of the network medium among multiple devices.

Submit
71. To make a cross-over UTP cable you would perform which of the following pinouts?

Explanation

To make a cross-over UTP cable, you would perform T568a on one end and T568b on the other end. This is because a cross-over cable is used to connect two devices of the same type (e.g., two computers) directly without the need for a hub or switch. In this configuration, the transmit and receive pairs are reversed, allowing the devices to communicate effectively. T568a and T568b are two different pinouts commonly used in Ethernet cables, and using them on opposite ends ensures the proper crossover configuration.

Submit
72. A modern network that implements a single network infrastructure (cables and connecting devices) to carry not only data but also video and voice communications would be considered to be a __________________.

Explanation

A converged network refers to a modern network that combines different types of communications, such as data, video, and voice, into a single infrastructure. This means that instead of having separate networks for each type of communication, all of them are carried over the same cables and connecting devices. This allows for more efficient and cost-effective communication as it eliminates the need for multiple networks and infrastructure.

Submit
73. Which of the following applications is MOST likely to require QoS to ensure proper functionality?

Explanation

VoIP (Voice over Internet Protocol) is the most likely application to require Quality of Service (QoS) to ensure proper functionality. QoS is necessary for VoIP because it prioritizes and manages network traffic to provide a consistent and reliable voice communication experience. VoIP relies on real-time audio transmission, and any delay, jitter, or packet loss can significantly degrade call quality. QoS helps to prioritize VoIP traffic over other less time-sensitive data, ensuring that voice packets are delivered with minimal delay and maximum quality.

Submit
74. Which of the following remote access methods allows an administrator to take control of a user's machine and block the user from seeing the active session?

Explanation

RDP (Remote Desktop Protocol) is a remote access method that allows an administrator to take control of a user's machine and block the user from seeing the active session. RDP provides a graphical interface for the administrator to access and control the user's desktop remotely. This can be useful for troubleshooting or performing tasks on the user's machine without interrupting their work or allowing them to see what is happening on their screen.

Submit
75. Which of the following protocols is commonly used for VoIP technology?

Explanation

SIP (Session Initiation Protocol) is commonly used for VoIP (Voice over Internet Protocol) technology. SIP is an application-layer protocol that establishes, modifies, and terminates multimedia sessions such as voice and video calls over IP networks. It is designed to enable communication between devices and applications in a flexible and scalable manner. Telnet is a remote login protocol, SMTP is an email protocol, and SNMP is a network management protocol, none of which are directly related to VoIP technology.

Submit
76. At what layer does the TCP/IP protocol stack define the most protocols?

Explanation

The TCP/IP protocol stack defines the most protocols at the Application layer. This layer is responsible for providing network services to applications and includes protocols such as HTTP, FTP, SMTP, and DNS. These protocols enable communication between different applications running on different devices over a network. The Transport layer, Internet layer, and Network Interface layer also define protocols, but the Application layer has the highest number of protocols defined within the TCP/IP protocol stack.

Submit
77. Given the following configuration information: IP address: 150.150.150.38 subnet mask: 255.255.255.0 default gateway: 150.150.150.1 DNS server: 150.150.150.10 Which of the following would you ping to verify that the DNS server was functioning normally?

Explanation

To verify that the DNS server is functioning normally, you would ping the DNS server's IP address, which is 150.150.150.10. Pinging www.google.ca would not directly test the functionality of the DNS server as it would rely on the DNS server to resolve the domain name to an IP address before pinging it.

Submit
78. The open area in walls and ceilings in a building often used to circulate air is known as the _________________ environment. Cable running in those spaces should be rated for use in this environment.

Explanation

The open area in walls and ceilings in a building often used to circulate air is known as the plenum environment. Cable running in those spaces should be rated for use in this environment.

Submit
79. Given the following results of the route print command what can you tell about the client system the command was run on?

Explanation

Based on the given results of the route print command, it can be inferred that the client system has a misconfigured IP address. This is because the statement "It cannot communicate with anyone beyond its local network" suggests that the system is unable to establish connections outside of its local network, indicating a problem with its IP address configuration.

Submit
80. Of the following; which would be considered network resources we could share or access? (choose 3)

Explanation

The correct answer is storage, printer, and internet connection. These network resources can be shared or accessed by multiple users. Storage refers to shared drives or cloud storage where files and data can be stored and accessed by different users. Printers can be connected to a network and shared among multiple devices, allowing users to print from different locations. An internet connection is a key network resource that enables users to access online resources, communicate, and share information over the internet.

Submit
81. Supported on most every network device, ________________ allows network administrators to monitor and manage their network environment from a central location. The ability to set traps and get notified of specific activity or run automated scripts can also make network management much more efficient.

Explanation

SNMP (Simple Network Management Protocol) is supported on most every network device, allowing network administrators to monitor and manage their network environment from a central location. SNMP provides a standardized way for devices to communicate and exchange information about their status, performance, and configuration. It allows administrators to set traps and receive notifications of specific activities or events, enabling them to take proactive actions. SNMP also supports the execution of automated scripts, which can further enhance network management efficiency. Therefore, SNMP is the correct answer for this question.

Submit
82. Today considered the weakest of the VPN protocol options, ______________ although widely supported is mostly being replaced by SSTP and IKEv2 on Microsoft systems.

Explanation

L2TP is considered the weakest of the VPN protocol options today and is being mostly replaced by SSTP and IKEv2 on Microsoft systems.

Submit
83. The point that seperates the customers equipment from the ISPs equipment is known as what?

Explanation

The point that separates the customers' equipment from the ISP's equipment is known as the demarcation point. This is where the responsibility for the network connection shifts from the ISP to the customer. It is typically a physical location or device where the network interface is installed, allowing for the connection to be established and maintained.

Submit
84. Often seen in an orange jacket, this fiber optic cabling is commonly used for LANs.

Explanation

Multi-mode fiber optic cabling is commonly used for LANs. It is often seen in an orange jacket, making it easily recognizable. This type of cabling is designed to carry multiple light rays simultaneously, allowing for higher bandwidth and shorter transmission distances. It is cost-effective and suitable for shorter distance applications within buildings or campuses.

Submit
85. Of the three types of copper cabling, which is the most commonly used on networks today?

Explanation

UTP (Unshielded Twisted Pair) is the most commonly used type of copper cabling on networks today. It is cost-effective, easy to install, and provides sufficient performance for most network applications. UTP cables consist of pairs of twisted copper wires, which help to reduce electromagnetic interference. They are widely used for Ethernet connections and are compatible with various networking devices. STP (Shielded Twisted Pair) is another type of copper cabling that offers better protection against interference but is less commonly used. Coaxial cables and fiber optic cables are not copper cabling types, making UTP the correct answer.

Submit
86. To ensure the remote host is available to connect with, TCP will first establish a ______________ before sending any data.

Explanation

TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol. Before sending any data, TCP establishes a session with the remote host. This session is a virtual connection that allows both ends to communicate and exchange data. The session establishment involves a series of steps known as the handshake, where the two hosts exchange control messages to synchronize and establish the connection. Therefore, the correct answer is "session."

Submit
87. Protocols like IP, ICMP and ARP work at the __________________ layer of the TCP/IP 4 layer networking model.

Explanation

Protocols like IP, ICMP, and ARP work at the internet layer of the TCP/IP 4 layer networking model. This layer is responsible for routing packets across different networks and ensuring that they reach their intended destination. The protocols at this layer provide addressing, fragmentation, and reassembly of packets, as well as error detection and handling. They operate independently of the specific network technology being used and focus on the logical transmission of data between networks.

Submit
88. Where can a client system get an IP address and the associated information from? (choose 2)

Explanation

A client system can obtain an IP address and associated information from a DHCP server. DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses to client devices on a network. The DHCP server is responsible for managing and distributing IP addresses to client systems. Additionally, a network administrator can also provide an IP address and associated information manually to a client system if necessary.

Submit
89. The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the following connectivity issues did the technician discover?

Explanation

The technician discovered open pairs connectivity issues. Open pairs refer to a situation where one or more wires in a cable are cut or disconnected, resulting in a loss of connectivity. In this case, one of the wires in the CAT5 cable is cut in half, causing a break in the connection and leading to connectivity issues.

Submit
90. How many bytes is a MAC address?

Explanation

A MAC address is a unique identifier assigned to network interfaces for communications on a network. It consists of 6 bytes or 48 bits. Each byte is represented by 2 hexadecimal digits, resulting in a total of 12 characters when written in the standard format. Therefore, the correct answer is 6.

Submit
91. The 568a and 568b standards used to define UTP cable pinouts were set by __________.

Explanation

The 568a and 568b standards used to define UTP cable pinouts were set by the TIA (Telecommunications Industry Association). The TIA is a trade association that develops standards for the information and communications technology industry. These standards ensure that UTP cables are wired consistently, allowing for proper communication and connectivity in networking systems.

Submit
92. Secure Shell or SSH uses TCP as its transport over port _______

Explanation

SSH (Secure Shell) is a network protocol that provides secure communication between two systems. It uses TCP (Transmission Control Protocol) as its transport layer protocol. The correct answer is 22 because SSH operates over port 22. This port is specifically designated for SSH traffic, allowing for secure remote access and secure file transfers between systems.

Submit
93. Which of the following cable types is intended to be used on short distances and is immune to any type of interference?

Explanation

Multimode fiber is the correct answer because it is designed to be used on short distances and is immune to any type of interference. Unlike singlemode fiber, which is better suited for longer distances, multimode fiber allows multiple light rays to travel simultaneously through the core, resulting in higher data transmission rates. Additionally, multimode fiber is less susceptible to interference compared to shielded twisted pair and unshielded twisted pair cables, which are commonly used for Ethernet connections.

Submit
94. Of the following choose the three that would be used with fiber optic cabling. (choose 3)

Explanation

The three options that would be used with fiber optic cabling are ST, SC, and LC. These are all types of connectors that are specifically designed for use with fiber optic cables. ST connectors are commonly used in data communications and are easy to install and remove. SC connectors are widely used in telecommunications and are known for their low insertion loss and high return loss. LC connectors are smaller in size and are commonly used in high-density applications. These connectors ensure a secure and reliable connection for transmitting data through fiber optic cables.

Submit
95. A workstation is having connectivity issues when being added to the domain. Which of the following commands would allow the administrator to see the DNS and WINS servers that are currently configured for the workstation?

Explanation

The correct answer is "Ipconfig." The Ipconfig command is used to display the IP configuration settings of a network interface on a Windows computer. By running the Ipconfig command, the administrator can view the DNS (Domain Name System) and WINS (Windows Internet Name Service) servers that are currently configured for the workstation. This information can help identify any connectivity issues related to the domain.

Submit
96. The key flow control mechanism used by TCP is called ___________ ____________ and allows the receiver to keep received segments in order and only send acknowledgments after a certain amount of data has been received.

Explanation

The key flow control mechanism used by TCP is called sliding windows. This mechanism allows the receiver to keep received segments in order and only send acknowledgments after a certain amount of data has been received. With sliding windows, the receiver can control the flow of data by adjusting the size of the window, which determines how many segments can be sent before an acknowledgment is required. This helps to optimize the transmission of data and prevent congestion on the network.

Submit
97. Which of the following connectors would be found on the end of a coaxial cable run?

Explanation

The F-Type connector would be found on the end of a coaxial cable run. The F-Type connector is commonly used for cable television, satellite television, and broadband internet connections. It has a threaded connector that provides a secure and stable connection, making it suitable for long cable runs. The F-Type connector is designed to minimize signal loss and interference, ensuring high-quality audio and video transmission.

Submit
98. Other than segmentation what other service do both TCP and UDP provide for the upper layer protocols?

Explanation

Both TCP and UDP provide service addressing for the upper layer protocols. This means that they allow the upper layer protocols to identify the specific service or application that they want to communicate with on a remote host. This is important for establishing a connection and ensuring that the data is sent to the correct destination.

Submit
99. What protocol does Microsoft clients employ for file transfers?

Explanation

Microsoft clients employ the SMB (Server Message Block) protocol for file transfers. SMB is a network file sharing protocol that allows clients to access files, printers, and other resources on a network. It is commonly used in Windows operating systems to facilitate file sharing and remote access.

Submit
100. What is dark fiber?

Explanation

Dark fiber refers to currently unused fiber cable runs. These are fiber optic cables that have been laid but are not yet being utilized for data transmission. These unused cables can be found in various locations, such as underground or along telecommunication routes. Dark fiber is often leased or sold to companies or organizations that require high-speed data transmission, allowing them to have exclusive access to the fiber optic network. By utilizing dark fiber, these companies can have greater control over their network infrastructure and bandwidth capacity.

Submit
101. How many broadcast domain and collision domains are in the diagram below?

Explanation

The diagram likely shows multiple interconnected network devices, such as switches or routers. Each network device creates a separate collision domain, which is a network segment where packets can collide if multiple devices transmit at the same time. In the diagram, there are five separate network devices, so there are five collision domains. On the other hand, the diagram likely shows two separate networks or VLANs, each with its own broadcast domain. Therefore, there are two broadcast domains and five collision domains in the diagram.

Submit
102. When purchasing a box of UTP cable, which of the following are factors that differenctiate different cables? (choose 3)

Explanation

The factors that differentiate different cables when purchasing a box of UTP cable are the category (Cat 5, Cat 5e, Cat 6), wire gauge, and MHz rating. The category determines the performance and speed capabilities of the cable, with Cat 6 being the highest. The wire gauge refers to the thickness of the wire, with lower gauge numbers indicating thicker wires and better transmission quality. The MHz rating indicates the frequency range that the cable can support, with higher MHz ratings allowing for higher data transfer rates. These three factors are important considerations when selecting UTP cables for specific networking needs.

Submit
103. How does TCP guarantee delivery? (choose 4)

Explanation

TCP guarantees delivery by number and sequencing the segments, providing flow control, establishing a session, and requiring acknowledgements. By numbering and sequencing the segments, TCP ensures that they are sent and received in the correct order. Flow control allows TCP to regulate the rate at which data is sent, preventing overload and ensuring efficient delivery. Establishing a session involves setting up a connection between the sender and receiver, allowing for reliable communication. Finally, requiring acknowledgements ensures that the receiver acknowledges the receipt of data, allowing for error detection and retransmission if necessary.

Submit
104. An administrator attempts to open a web page and sees the following error: 'Error 404: Page not found'. The administrator then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?

Explanation

The problem most likely resides at Layer 1, the physical layer. This is because the administrator is unable to ping the default gateway, indicating a connectivity issue at the lowest level of the network stack. Layer 1 deals with the physical transmission of data, such as cables, connectors, and network interface cards. If the default gateway cannot be pinged, it suggests a problem with the physical connection between the administrator's device and the gateway.

Submit
105. Which of the following protocols can be found at the application layer?

Explanation

Telnet is a protocol that operates at the application layer. It allows a user to remotely access and control a device or computer over a network. This protocol provides a virtual terminal session, allowing users to interact with the remote device as if they were physically present. Telnet is commonly used for remote administration, troubleshooting, and configuring network devices. Unlike TCP and UDP, which operate at the transport layer, Telnet is specifically designed for application layer communication. SNMP (Simple Network Management Protocol) is also an application layer protocol, but the correct answer is Telnet.

Submit
106. Made up of 48 bits and represented in hexidecimal, the _____________ address is hard coded into the firmware of the NIC or interface it is associated with.

Explanation

The correct answer is "all of the above". The explanation is that the MAC address, also known as the Media Access Control address, is made up of 48 bits and is represented in hexadecimal format. It is hard coded into the firmware of the Network Interface Card (NIC) or interface it is associated with. The MAC address is used to uniquely identify a device on a network. Additionally, the MAC address is a fundamental component of Ethernet, which is a widely used networking technology. Therefore, all the options provided (MAC, BIA, and Ethernet) are correct as they are all related to the MAC address.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 07, 2018
    Quiz Created by
    Timlem
Cancel
  • All
    All (106)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The global Internet would be considered a _________?
The ISO defined the OSI model to create a standardized approach to...
The application, presentation and session layers can be grouped...
A ___________________ is a temporary storage location in memory used...
Using a 3-way handshake to establish a connection-oriented session...
UDP does not guarantee delivery of segments in any form and is...
How many bits is an IPv4 address?
The wireless standards used for WLANs are known as ________________.
Providing both logical addressing and routing functions the...
A company plans to implement a wired network between several...
The primary network architecture used on LANs today is...
A network in which all systems are equal and can share and access...
The transport of choice for streaming audio and video is _____________...
Every device has a direct connection (physically or virtually) to...
Including the logical source and destination addressing a...
For every predetermined amount of data TCP sends the receiving station...
_____________________ IP addressing can be labor intensive and error...
A one to everyone communication is known as a ______________________...
UTP wires are twisted in pairs to help reduce the effects of this...
At which of the following layers does the TCP protocol operate?
Which of the following is a secure method of remote access via command...
Which of the following logical network topologies is used to provide a...
L2TP and PPTP are protocols associated with what service?
In which of the following layers of the OSI model does the TCP...
A network technician wants to use a packet analyzer to troubleshoot a...
One of the primary functions of the Transport layer...
An administrator replaced a router with a switch. End users are able...
Logical addressing today is pretty much exclusively represented by...
The ________________ layers of the OSI model including Datalink and...
The combination of an IP address and a port number known as a...
Two types of interference that can interfere with UTP based network...
Which secure command line utility is used for remote management of a...
It's impossible for a system to communicate directly with a...
What does a system need before they can communicate directly with...
Made up of the first 3 bytes (24 bits) of the MAC address the...
MAC or physical addresses are divided into two parts. The second part...
Which of the following processes translates a private IP address for a...
In the data encapsulation process the PDU created at the Transport...
Paying a usage fee to leverage a larger corporations excess network...
This device breaks up collision domains and keeps track of what device...
Required to make an IP address meaninful, the _________________ hides...
What does the tracert utility mostly help with?
The ____________ protocol provides error messaging for IP...
The Internet is no longer just made up of files to upload or download...
What information can the Netstat command line utility provide?
This device breaks up broadcast domains and keeps track of and...
Who would the following destination MAC address be sent to by a...
In order for computers with private IP addresses to access the public...
A one to a group communication known as a ___________________ is used...
Large networks that span borders and are made up of hunderds of...
Which three of the following protocols are associated with email?...
Which of the following ports does POP3 services use, by default?
A new department is formed and a new section of the building is being...
For modern long distance, high-bandwidth installations you would most...
The unit of data produced at the lower layers of the OSI model is...
Collaboration software could best be defined or described as...
Which of the following devices separates a LAN segment into two...
Which of the following is a hybrid network topology used for fault...
Which of the following is a key rule concerning subnet masks?
What is required to make sense of an IP address or to make it useful?
This port is used to create an initial configuration on a Cisco router...
When the DHCP server is unavailable for a network, how will PCs...
The PDU created at the Internet layer of the TCP/IP 4 layer model is...
What command will display your cache of IP to MAC address name...
Looking at the following address, identify what class address it is: ...
What type of address is the following? 169.254.73.244 255.255.0.0
The standard topology used on UTP switch based networks is a...
HTTPS uses secure sockets layer over TCP on port __________ to ensure...
What IP helper protocol is used by both the Ping and Tracert utilities...
The media access method used by Ethernet networks is...
To make a cross-over UTP cable you would perform which of the...
A modern network that implements a single network infrastructure...
Which of the following applications is MOST likely to require QoS to...
Which of the following remote access methods allows an administrator...
Which of the following protocols is commonly used for VoIP technology?
At what layer does the TCP/IP protocol stack define the most...
Given the following configuration information: ...
The open area in walls and ceilings in a building often used to...
Given the following results of the route print command what can you...
Of the following; which would be considered network resources we could...
Supported on most every network device, ________________ allows...
Today considered the weakest of the VPN protocol options,...
The point that seperates the customers equipment from the ISPs...
Often seen in an orange jacket, this fiber optic cabling is commonly...
Of the three types of copper cabling, which is the most commonly used...
To ensure the remote host is available to connect with, TCP will first...
Protocols like IP, ICMP and ARP work at the __________________ layer...
Where can a client system get an IP address and the associated...
The technician notices that one of the wires in a CAT5 cable is cut in...
How many bytes is a MAC address?
The 568a and 568b standards used to define UTP cable pinouts were set...
Secure Shell or SSH uses TCP as its transport over port _______
Which of the following cable types is intended to be used on short...
Of the following choose the three that would be used with fiber optic...
A workstation is having connectivity issues when being added to the...
The key flow control mechanism used by TCP is called ___________...
Which of the following connectors would be found on the end of a...
Other than segmentation what other service do both TCP and UDP provide...
What protocol does Microsoft clients employ for file transfers?
What is dark fiber?
How many broadcast domain and collision domains are in the diagram...
When purchasing a box of UTP cable, which of the following are factors...
How does TCP guarantee delivery? (choose 4)
An administrator attempts to open a web page and sees the following...
Which of the following protocols can be found at the application...
Made up of 48 bits and represented in hexidecimal, the _____________...
Alert!

Advertisement