Which of the following answers refer(s) to coaxial cabling? (select all that apply)

61. The physical layout of computers, cables, and other components on a network is known as which of the following?

62. You wish to extend your intranet to certain business partners. What type of network are you building?

63. Which type of server is responsible for storing files for users on the network?

64. A company has offices in Halifax and Toronto. Both networks are connected to allow the two locations to communicate. This is considered what type of network?

65. What is the name given to languages that are used for network communication?

66. Which of the following is an example of a layer-2 address?

c. Computer100.glensworld.loc

67. Which network component is used to extend the distance the signal can travel by regenerating the signal?

68. Which networking feature allows you to group ports on a switch to create a broadcast domain?

69. Which layer of the OSI model does a bridge run at?

70. When data is sent to a system on a switch, the data is sent to what port(s)?

a. The port of the destination system

b. All ports on the immediate hub, but not the any uplinked hubs

c. All ports on the immediate hub and any uplinked hubs

d. All ports on the uplinked hub

71. Which type of device is responsible for connecting dissimilar networking environments together?

72. How many bits in an IP address?

73. A computer with a subnet mask of 255.255.255.0 has how many octets for the network ID?

74. Which TCP/IP setting is not required if you want to communicate on the LAN by IP address only?

75. Which address is reserved for internal loopback functions?

76. What is the well-known port number for the HTTP service?

77. Which of the following addresses is a private IP address? (Select all that apply.)

78. Which network service is responsible for assigning IP addresses out to systems on the network when they boot up?

79. You have the network ID of 131.107.0.0 and you would like to subnet your network into six networks. What will be your new subnet mask?

80. In binary, how do you calculate the broadcast address of a network range?

a. All host bits set to 0

b. All host bits set to 0, except for the low-order bit

c. All host bits set to 1, except for the low-order bit

d. All host bits set to 1

81. In binary, how do you calculate the network ID of a network range?

a. All host bits set to 0

b. All host bits set to 0, except for the low-order bit

c. All host bits set to 1, except for the low-order bit

d. All host bits set to 1

82. The last valid address of a subnet is always+

a. One more than the broadcast address

b. One less than the broadcast address

c. One more than the network ID

d. One less than the network ID

83. ARP is responsible for converting ....................... addresses to ....................... addresses.

84. Which protocol is defined to use TCP port 23?

85. Which items are not available for display in IPCONFIG?

c. DHCP lease information

86. Which option of IPCONFIG is used to receive a new lease on your IP address?

87. Which utility is used to facilitate file transfers between two remote hosts?

88. Which wireless mode involves two laptops connecting directly to one another?

89. Which of the following is the name you assign to your wireless network?

b. Service Set Identifier (SSID)

90. A device designed to filter and transfer data packets between dissimilar types of computer networks is called:

91.Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between Local Area Network (LAN) segments?

92.What is the maximum payload value for a standard Ethernet frame?

93.Which of the answers listed below refers to the MTU for a standard Ethernet frame?

94.Which of the following tools would be used to identify running services on a networked host?

95.The process of planning and designing new WLANs for optimal performance, security, and compliance typically involves:

c. Vulnerability scanning

d. End user awareness and training

96.In half-duplex communication transmission takes place:

a. In two directions simultaneously

b. Only in one direction at a time

d. In both directions at half the speed

97.A type of transmission that takes place in two directions simultaneously is known as:

98.In the OSI model, data compression takes place at the:

99.The term "Presentation layer" refers to:

a. Layer 7 of the OSI model

b. Layer 5 of the OSI model

c. Layer 6 of the OSI model

d. Layer 4 of the OSI model

100.Data encryption and decryption typically takes place at the:

a. Layer 3 of the OSI model

b. Presentation layer of the OSI model

c. Data link layer of the OSI model

d. Layer 1 of the OSI model

101.Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)

101.Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard amendment? (Select all that apply)

a. Maximum data signaling rate of 54 Mbps

b. 5.0 GHz frequency band

c. Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

d. 2.4 GHz frequency band

e. Maximum data signaling rate of 11 Mbps

f. Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method

102.Which of the answers listed below refer(s) to UTP cabling? (Select all that apply)

a. Twisted-pair copper cabling

b. Used in Ethernet networks and telephone systems

c. Low cost and ease of installation

d. Takes advantage of additional protective cover reducing signal interference from outside sources

f. Not surrounded by any shielding that would provide protection against interference from outside sources

h. Installed with 8P8C connector type

103.Which of the following cabling types provide(s) protection against Electromagnetic Interference (EMI)? (Select all that apply)

104.Which of the following answers refer to the 100BaseTX Ethernet standard? (Select 3 answers)

a. Maximum cable segment length of 100 meters

b. Twisted-pair copper cabling (Category 5 or higher)

d. Maximum cable segment length of 185 meters

f. Twisted-pair copper cabling (Category 3 or higher)

105.Which of the ports listed below are used by client applications designed to retrieve email messages from mail servers? (Select 2 answers)

106.POP3: (Select 2 answers)

a. Is a protocol for sending email messages between servers

d. Is a protocol used to retrieve email messages from a mail server

107.IMAP4: (Select 2 answers)

b. Is a protocol used to retrieve email messages from a mail server

c. Is a protocol for sending email messages between servers

108.Simple Mail Transfer Protocol (SMTP) operates with the use of TCP port:

109.Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).

110.File Transfer Protocol (FTP) runs by default on TCP ports: (Select 2 answers)

111.Which of the following protocols is used in network management systems for monitoring network-attached devices?

112.Which of the following answers lists a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?

113.A hacker has captured network traffic with cleartext commands sent from the client to the server console. Which of the following ports is being used by the network admin for the client-server communication?

115.What is the basic purpose of a local area network (LAN)?

a. To interconnect networks in several different buildings

b. To connect one or more computers together so they can share resources

c. To interconnect 2 to 10 routers

d. To make routers unnecessary

116.HTTP, FTP, and Telnet work at which layer of the OSI model?

117.Which of the following IP addresses are not allowed on the Internet? (Choose all that apply.)

118.If you wanted to verify the local IP stack on your computer, what would you do?

e. telnet 255.255.255.255

119.The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer of the OSI. What is the encapsulation named at the Data Link layer?

120.Where does a Data Link layer frame have to carry a Network layer packet if the packet is destined for a remote network?

Which of the following connector types are used with coaxial cabling?

The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector (See fig. 4). Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network.

Which of the following connector types are used for RS 232 serial communications?

The RS-232 standard states that DTE devices use a 25-pin male connector, and DCE devices use a 25-pin female connector. You can therefore connect a DTE device to a DCE using a straight pin-for-pin connection.

Which of the following types of Ethernet cables are designed for reduced signal interference quizlet?

An STP cable provides protection against network eavesdropping and signal interference and works at the physical layer. It consists of one or more pairs of twisted wires that are insulated with a metal foil to minimize electromagnetic interference.

What are some characteristic features of RG 59 cabling specification?

RG-59/U is a specific type of coaxial cable, often used for low-power video and RF signal connections. The cable has a characteristic impedance of 75 ohms, and a capacitance of around 20pF/ft (60pF/m). The 75 ohm impedance matches a dipole antenna in free space.