The global Internet would be considered a _________?
The ISO defined the OSI model to create a standardized approach to...
The application, presentation and session layers can be grouped...
Using a 3-way handshake to establish a connection-oriented session...
UDP does not guarantee delivery of segments in any form and is...
A ___________________ is a temporary storage location in memory used...
How many bits is an IPv4 address?
The wireless standards used for WLANs are known as ________________.
Providing both logical addressing and routing functions the...
The primary network architecture used on LANs today is...
A company plans to implement a wired network between several...
Every device has a direct connection (physically or virtually) to...
The transport of choice for streaming audio and video is _____________...
A network in which all systems are equal and can share and access...
Including the logical source and destination addressing a...
_____________________ IP addressing can be labor intensive and error...
For every predetermined amount of data TCP sends the receiving station...
At which of the following layers does the TCP protocol operate?
A one to everyone communication is known as a ______________________...
UTP wires are twisted in pairs to help reduce the effects of this...
A network technician wants to use a packet analyzer to troubleshoot a...
Which of the following is a secure method of remote access via command...
Which of the following logical network topologies is used to provide a...
L2TP and PPTP are protocols associated with what service?
One of the primary functions of the Transport layer...
In which of the following layers of the OSI model does the TCP...
An administrator replaced a router with a switch. End users are able...
The ________________ layers of the OSI model including Datalink and...
Two types of interference that can interfere with UTP based network...
What does a system need before they can communicate directly with...
Logical addressing today is pretty much exclusively represented by...
Which secure command line utility is used for remote management of a...
It's impossible for a system to communicate directly with a...
MAC or physical addresses are divided into two parts. The second part...
The combination of an IP address and a port number known as a...
In the data encapsulation process the PDU created at the Transport...
Paying a usage fee to leverage a larger corporations excess network...
Required to make an IP address meaninful, the _________________ hides...
Which of the following processes translates a private IP address for a...
Made up of the first 3 bytes (24 bits) of the MAC address the...
The Internet is no longer just made up of files to upload or download...
This device breaks up collision domains and keeps track of what device...
Who would the following destination MAC address be sent to by a...
The ____________ protocol provides error messaging for IP...
In order for computers with private IP addresses to access the public...
A one to a group communication known as a ___________________ is used...
What does the tracert utility mostly help with?
Which of the following ports does POP3 services use, by default?
For modern long distance, high-bandwidth installations you would most...
The unit of data produced at the lower layers of the OSI model is...
What information can the Netstat command line utility provide?
This device breaks up broadcast domains and keeps track of and...
What is required to make sense of an IP address or to make it useful?
A new department is formed and a new section of the building is being...
Collaboration software could best be defined or described as...
This port is used to create an initial configuration on a Cisco router...
Which three of the following protocols are associated with email?...
Which of the following devices separates a LAN segment into two...
Large networks that span borders and are made up of hunderds of...
Which of the following is a hybrid network topology used for fault...
When the DHCP server is unavailable for a network, how will PCs...
Which of the following is a key rule concerning subnet masks?
Looking at the following address, identify what class address it is:
...
What command will display your cache of IP to MAC address name...
The PDU created at the Internet layer of the TCP/IP 4 layer model is...
HTTPS uses secure sockets layer over TCP on port __________ to ensure...
What type of address is the following?
169.254.73.244
255.255.0.0
The standard topology used on UTP switch based networks is a...
A modern network that implements a single network infrastructure...
What IP helper protocol is used by both the Ping and Tracert utilities...
The media access method used by Ethernet networks is...
Which of the following applications is MOST likely to require QoS to...
To make a cross-over UTP cable you would perform which of the...
Which of the following remote access methods allows an administrator...
Of the following; which would be considered network resources we could...
Today considered the weakest of the VPN protocol options,...
Of the three types of copper cabling, which is the most commonly used...
The point that seperates the customers equipment from the ISPs...
At what layer does the TCP/IP protocol stack define the most...
Given the following configuration information:
...
The open area in walls and ceilings in a building often used to...
Which of the following protocols is commonly used for VoIP technology?
Supported on most every network device, ________________ allows...
Given the following results of the route print command what can you...
Where can a client system get an IP address and the associated...
Often seen in an orange jacket, this fiber optic cabling is commonly...
To ensure the remote host is available to connect with, TCP will first...
Protocols like IP, ICMP and ARP work at the __________________ layer...
The technician notices that one of the wires in a CAT5 cable is cut in...
How many bytes is a MAC address?
A workstation is having connectivity issues when being added to the...
Secure Shell or SSH uses TCP as its transport over port _______
Which of the following cable types is intended to be used on short...
Of the following choose the three that would be used with fiber optic...
Which of the following connectors would be found on the end of a...
The 568a and 568b standards used to define UTP cable pinouts were set...
The key flow control mechanism used by TCP is called ___________...
What is dark fiber?
How many broadcast domain and collision domains are in the diagram...
Other than segmentation what other service do both TCP and UDP provide...
What protocol does Microsoft clients employ for file transfers?
An administrator attempts to open a web page and sees the following...
When purchasing a box of UTP cable, which of the following are factors...
How does TCP guarantee delivery? (choose 4)
Which of the following protocols can be found at the application...
Made up of 48 bits and represented in hexidecimal, the _____________...