The global Internet would be considered a _________?
The ISO defined the OSI model to create a standardized approach to...
The application, presentation and session layers can be grouped...
A ___________________ is a temporary storage location in memory used...
Using a 3-way handshake to establish a connection-oriented session...
UDP does not guarantee delivery of segments in any form and is...
How many bits is an IPv4 address?
The wireless standards used for WLANs are known as ________________.
Providing both logical addressing and routing functions the...
A company plans to implement a wired network between several...
The primary network architecture used on LANs today is...
A network in which all systems are equal and can share and access...
The transport of choice for streaming audio and video is _____________...
Every device has a direct connection (physically or virtually) to...
Including the logical source and destination addressing a...
For every predetermined amount of data TCP sends the receiving station...
_____________________ IP addressing can be labor intensive and error...
A one to everyone communication is known as a ______________________...
UTP wires are twisted in pairs to help reduce the effects of this...
At which of the following layers does the TCP protocol operate?
Which of the following is a secure method of remote access via command...
Which of the following logical network topologies is used to provide a...
L2TP and PPTP are protocols associated with what service?
In which of the following layers of the OSI model does the TCP...
A network technician wants to use a packet analyzer to troubleshoot a...
One of the primary functions of the Transport layer...
An administrator replaced a router with a switch. End users are able...
Logical addressing today is pretty much exclusively represented by...
The ________________ layers of the OSI model including Datalink and...
The combination of an IP address and a port number known as a...
Two types of interference that can interfere with UTP based network...
Which secure command line utility is used for remote management of a...
It's impossible for a system to communicate directly with a...
What does a system need before they can communicate directly with...
Made up of the first 3 bytes (24 bits) of the MAC address the...
MAC or physical addresses are divided into two parts. The second part...
Which of the following processes translates a private IP address for a...
In the data encapsulation process the PDU created at the Transport...
Paying a usage fee to leverage a larger corporations excess network...
This device breaks up collision domains and keeps track of what device...
Required to make an IP address meaninful, the _________________ hides...
What does the tracert utility mostly help with?
The ____________ protocol provides error messaging for IP...
The Internet is no longer just made up of files to upload or download...
What information can the Netstat command line utility provide?
This device breaks up broadcast domains and keeps track of and...
Who would the following destination MAC address be sent to by a...
In order for computers with private IP addresses to access the public...
A one to a group communication known as a ___________________ is used...
Large networks that span borders and are made up of hunderds of...
Which three of the following protocols are associated with email?...
Which of the following ports does POP3 services use, by default?
A new department is formed and a new section of the building is being...
For modern long distance, high-bandwidth installations you would most...
The unit of data produced at the lower layers of the OSI model is...
Collaboration software could best be defined or described as...
Which of the following devices separates a LAN segment into two...
Which of the following is a hybrid network topology used for fault...
Which of the following is a key rule concerning subnet masks?
What is required to make sense of an IP address or to make it useful?
This port is used to create an initial configuration on a Cisco router...
When the DHCP server is unavailable for a network, how will PCs...
The PDU created at the Internet layer of the TCP/IP 4 layer model is...
What command will display your cache of IP to MAC address name...
Looking at the following address, identify what class address it is:
...
What type of address is the following?
169.254.73.244
255.255.0.0
The standard topology used on UTP switch based networks is a...
HTTPS uses secure sockets layer over TCP on port __________ to ensure...
What IP helper protocol is used by both the Ping and Tracert utilities...
The media access method used by Ethernet networks is...
To make a cross-over UTP cable you would perform which of the...
A modern network that implements a single network infrastructure...
Which of the following applications is MOST likely to require QoS to...
Which of the following remote access methods allows an administrator...
Which of the following protocols is commonly used for VoIP technology?
At what layer does the TCP/IP protocol stack define the most...
Given the following configuration information:
...
The open area in walls and ceilings in a building often used to...
Given the following results of the route print command what can you...
Of the following; which would be considered network resources we could...
Supported on most every network device, ________________ allows...
Today considered the weakest of the VPN protocol options,...
The point that seperates the customers equipment from the ISPs...
Often seen in an orange jacket, this fiber optic cabling is commonly...
Of the three types of copper cabling, which is the most commonly used...
To ensure the remote host is available to connect with, TCP will first...
Protocols like IP, ICMP and ARP work at the __________________ layer...
Where can a client system get an IP address and the associated...
The technician notices that one of the wires in a CAT5 cable is cut in...
How many bytes is a MAC address?
The 568a and 568b standards used to define UTP cable pinouts were set...
Secure Shell or SSH uses TCP as its transport over port _______
Which of the following cable types is intended to be used on short...
Of the following choose the three that would be used with fiber optic...
A workstation is having connectivity issues when being added to the...
The key flow control mechanism used by TCP is called ___________...
Which of the following connectors would be found on the end of a...
Other than segmentation what other service do both TCP and UDP provide...
What protocol does Microsoft clients employ for file transfers?
What is dark fiber?
How many broadcast domain and collision domains are in the diagram...
When purchasing a box of UTP cable, which of the following are factors...
How does TCP guarantee delivery? (choose 4)
An administrator attempts to open a web page and sees the following...
Which of the following protocols can be found at the application...
Made up of 48 bits and represented in hexidecimal, the _____________...