IT2400

Card Set Information

Author:
rollenrock
ID:
109507
Filename:
IT2400
Updated:
2011-10-17 01:34:31
Tags:

Folders:

Description:
Chapters 6-8
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user rollenrock on FreezingBlue Flashcards. What would you like to do?


  1. All the cabling from individual work areas runs via
    _____________ to a central location.
    horizontal cabling
  2. The central location that all cabling runs to is called the____________.
    telecommunications room
  3. A single piece of installed horizontal cabling is called a(n) ______________.
    run
  4. The set of standards established by the EIA/TIA regarding network cabling is called____________.
    structured cabling
  5. You use a(n) _________ to connect a strand of UTP to a 110 block or 66 block.
    punchdown tool
  6. A short UTP cable that uses stranded, rather than solid, cable is called a(n) __________ and can tolerate much more handling near a patch panel.
    patch cable
  7. The type of network interface unit (NUI) that enables an ISP or telephone company to determine if a home DSL box or cable router has been disconnected is called a(n) _____________.
    smart jack
  8. The spot where a cable comes out of the wall at the workstation is called a(n) ___________.
    cable drop
  9. The height measurement known as U is used for devices that fit into a(n) ____________.
    equipment rack
  10. The term ________________ describes the process of a signal weakening as it progressed down a piece of wire.
    attenuation
  11. Which term describes the length of cable installed within walls from a telecommunications room out to a jack?
    Cable drop
    Cable run
    Cable tester
    Cable tray
    Cable run
  12. What is the term used to describe where the network hardware and patch panels are kept?
    Drop room
    Telecommunications room
    Routing room
    Telecloset room
    Telecommunications room
  13. Aside from outright breakage, what’s the primary worry with bending a fiber optic cable too much?Attenuation
    Bonding
    Light leakage
    Near-end crosstalk
    Light leakage
  14. When connecting a cable run onto a patch panel, which tool should be used?
    110-punchdown tool
    Crimper
    TDR
    Tone generator
    110-punchdown tool
  15. Which of the following NIC types offers the most versatility?
    10
    10/100
    10/100/1000
    Only a nonmultispeed NIC
    10/100/1000
  16. What is the structured cabling name for the end user’s office space where network computers will be set up?Backbone
    Building entrance
    Cable drop
    Work area
    Work area
  17. What type of twisted-pair cabling would work best within ceilings near lighting?
    Solid core plenum
    Solid core PVC
    Stranded core plenum
    Stranded core PVC
    Solid core plenum
  18. Why would network techs use stranded core cabling from a patch panel’s ports to a switch?
    Cost
    Fire rating
    Flexibility
    Safety
    Flexibility
  19. What is the first thing a professional cable installer should do when providing an estimate at a site?
    Power on additional lighting
    Put on a grounding wrist strap
    Request a floor plan
    Set up ladders
    Request a floor plan
  20. What component would best allow more servers to be installed in the limited space of a telecommunications room?
    Cable tray
    Outlet box
    Patch panel
    Equipment rack
    Equipment rack
  21. How tall is a network router that is 8U?
    8 inches
    8 centimeters
    14 inches
    14 centimeters
    14 inches
  22. What is a TDR to help troubleshoot a network connection?
    Tune down resonator, a network tone generator
    Time detuning resonator, a network tester
    Time domain reflectometer, a network tester
    Time detail resource, a network schematic
    Time domain reflectometer, a network tester
  23. What is generated by every piece of UTP cable in existence?
    Modal distortion
    Crosstalk
    EMI
    ESD
    Crosstalk
  24. Which statement about structured cable is correct?
    The term “demark” refers to a physical location while the phrase “network interface unit” refers to a piece
    of equipment provided by an ISP.
    The term “demark” refers to a piece of equipment provided by an ISP while the phrase “network interface unit” refers to a piece of equipment provided by the customer.
    The terms “demark” and “network interface unit” refers to pieces of equipment provided by an ISP.
    A demark is used for fiber cabling while a network interface unit is used for UTP.
    The term "demarc" refers to a physical location while the phrase "network interface unit" refers ro a piece of equipment provided by an ISP.
  25. The _________ portion of an IP address resembles 150.0.0.0.
    network ID
  26. The ___________ portion of an IP address consists of from one to three octets, with the final octet between 1 and 254.
    host ID
  27. The single organization that distributes IP addresses is called the __________.
    IANA Internet Assigned Numbers Authority
  28. The IP address 10.11.12.13 is a valid ________________address.
    IPv4
  29. The command __________ is a program that comes with Microsoft Windows to show TCP/IP settings.
    IPCONFIG
  30. The command ______________ is a program for UNIX/LINUX/Macintosh used to show TCP/IP settings.
    IPCONFIG
  31. The _____________ protocol is used to translate MAC addresses to IP addresses.
    ARP Address Resolution Protocol
  32. Computers set for dynamic addressing that cannot locate a DHCP server use ____________ to assign themselves an IP address.
    APIPA Automatic Private IP Addressing
  33. The _______________ is the IP address of the router.
    default gateway
  34. The _________________ is a 32-bit binary number common to all computers on a network used to determine to which network a computer belongs.
    subnet mask
  35. What is the result of converting 11110000.10111001.00001000.01100111 to dotted decimal notation?
    4.5.1.5
    240.185.8.103
    15.157.16.230
    103.8.185.240
    240.185.8.103
  36. What does IANA stand for?
    International Association Numbers Authority
    International Association Numbering Authority
    Internet Assigned Numbering Authority
    Internet Assigned Numbers Authority
    Internet Assigned Numbers Authority
  37. Which of the following describe IPv4? (Select three.)
    Uses decimal, not hexadecimal numbers
    Uses periods, not colons, as separators
    Uses four octets
    Uses eight sets of characters
    • Uses decimal, not hexadecimal numbers
    • Uses periods, not colons, as separators
    • Uses four octets
  38. What is the result of converting 192.168.0.1 to binary?11000000.10101000.00000000.00000001
    11000000.10101000.00000000.10000000
    11000000.10101000.00000000.1
    11.10101.0.1
    11000000.10101000.00000000.00000001
  39. Which of the following are not valid IP addresses to assign to a Windows-based system? (Select two.)
    1.1.1.1/24
    127.0.0.1/24
    250.250.250.255/24
    192.168.0.1/24
    • 127.0.0.1/24
    • 250.250.250.255.24
  40. Which of the following is a valid Class A IP address?22.33.44.55
    127.0.0.1
    250.250.250.250
    192.168.0.1
    22.33.44.55
  41. Which of the following is a valid Class B IP address?10.10.10.253
    191.254.254.254
    192.168.1.1
    223.250.250.1
    191.254.254.254
  42. Which of the following is a valid Class C IP address?50.50.50.50
    100.100.100.100
    192.168.0.254
    250.250.250.250
    192.168.0.254
  43. Which method sends a packet from a single computer to a group of interested computers?Broadcast
    Unicast
    Multicast
    Omnicast
    Multicast
  44. What is the process used to take a single class of IP addresses and chop it up into smaller groups? (Select two.)
    CIDR
    PING
    Subnetting
    Subnitting
    • PING
    • Subnetting
  45. Which statements about subnet masks are true? (Select two.)
    Every network client has a unique subnet mask.
    Every client on a network shares the same subnet mask.
    A subnet consists of a string of zeroes followed by a string of ones.
    A subnet mask consists of a string of ones followed by a string of zeroes.
    • Every client on a network shares the same subnet mask.
    • A subnet mask consists of a string of ones followed by a string of zeros.
  46. In which order are packets created and sent when a client requests an IP address from a DHCP server?
    DHCP discovery, DHCP offer, DHCP request, DHCP acknowledge
    DHCP discovery, DHCP request, DHCP offer, DHCP acknowledge
    DHCP request, DHCP offer, DHCP discovery, DHCP acknowledge
    DHCP request, DHCP offer, DHCP acknowledge, DHCP discovery
    DHCP discovery, DHCP offer, DHCP request, DHCP acknowledge
  47. Which of the following is not a valid classful subnet mask?
    255.0.0.0
    255.255.0.0
    255.255.255.0
    255.255.255.255
    255.255.255.255
  48. Which of the following is a valid classless subnet mask?
    255.255.255.240
    255.0.0.0
    255.255.0.0
    255.255.255.0
    255.255.255.240
  49. Which of the following IP addresses indicates a computer configured for dynamic addressing was unable to locate a DHCP server?
    255.255.255.255
    192.168.1.1
    127.0.0.1
    169.254.1.30
    169.254.1.30
  50. A device called a(n) ____________ is also called a Layer 3 switch.
    router
  51. The external routing protocol used on the internet is_______________.
    BGP-4 Border Gateway Protocol
  52. The variety of ______________ methods would include RIP, OSPF, BGP, and IGRP.
    dynamic routing
  53. A(n) ________________ connects one Autonomous System to another Autonomous System.
    edge router
  54. __________________ is a routing protocol that updates routing tables about every 30 seconds resulting in overloaded network traffic.
    RIPv1
  55. When all routers can communicate with each other efficiently, they are said to have reached __________________.
    convergence
  56. Multiple networks that do not use IP addresses and are governed by a single protocol are known as ______________.
    Autonomous System. AS
  57. You can use the _______________ utility to troubleshoot routing problems.
    Traceroute
  58. A(n) ________________ is an arbitrary number generated by the sending computer that enables the receiving computer to know what application to use for the returning packet.
    ephemeral port
  59. How many IP addresses should a router have?
    One
    One or more
    Two
    Two or more
    Two or more
  60. Choose the Cisco Systems proprietary routing protocols from the following item (Select two.)
    BGP-4
    EIGRP
    IGRP
    OSPF
    • EIGRP
    • IGRP
  61. If specialty accounting software being used at your company requires that packet headers remain unchanged, which item cannot be used on your network?
    RIP
    NAT
    OSPF
    TRACEROUTE
    NAT
  62. How does a router use a routing table to determine over which path to send a packet?
    The first line in the routing table is used if the path is available; otherwise the router tries the next line down, and so on.
    The last line in the routing table is used if the path is available; otherwise the router tries the next line up, and so on.
    After examining all rows in the routing table, the router sends the packet along the path with the highest metric.
    After examining all rows in the routing table, the router sends the packet along the path with the lowest metric.
    After examining all rows in the routing table, the router sends the packet along the path with the lowest metric.
  63. Which version of NAT maps a single routable IP address to a single network node?
    Static NAT
    Dynamic NAT
    Pooled NAT
    Secure NAT
    Static NAT
  64. Which is not a valid port number?
    0
    255
    1024
    65,536
    65,536
  65. How is the distance between routers measured?
    In meters
    In hops
    In routes
    In segments
    In hops
  66. Distance vector routing protocols include which of the following? (Select two.)
    RIP
    OSPF
    BGP
    ASN
    • RIP
    • BGP
  67. Which of the following are benefits of RIPv2 over RIPv1? (Select two.)
    Longer convergence time
    Support for authentication
    Support for CIDR subnets
    Support for metrics
    • Support for authentication
    • Support for CIDR subnets
  68. What is one way Autonomous Systems differ from typical Ethernet networks?
    They require a minimum of 10 nodes.
    They cannot exceed a maximum of 255 nodes.
    They are not able to interact with the internet.
    They do not use IP addresses.
    They do not use IP addresses.
  69. Why are link state protocols more efficient than RIP?
    Entire routing tables are updated on a stricter schedule.
    They forward only changes to individual routes instead of forwarding entire routing tables.
    Packets can be sent along multiple routes at the same time.
    Link state can send larger packets.
    They forward only changes to individual routes instead of forwarding entire routing tables.
  70. What happens when you first connect and turn on an OSPF router?
    It floods the network with Hello packets as it looks for other OSPF routers.
    It floods the network by requesting routing tables from every computer on the network.
    It is unavailable for several hoursas it builds its default routing table.
    It runs a self-test to determine if it should run in hybrid mode (RIP and OSPF) or native mode (OSPF only).
    It floods the network with Hello packets as it looks for other OSPF routers.
  71. Which of the following is a valid Area ID for an Area 0 backbone?
    0
    0.0.0.0
    1.0
    255
    0.0.0.0
  72. How can you connect directly to a router for configuration purposes? (Select three.)
    Parallel cable
    USB cable
    Crossover cable
    Rollover cable
    • USB cable
    • Crossover cable
    • Rollover cable
  73. Once you have made a physical direct connection to a router, what utility/program can you use to issue commands and instructions to it? (Select three.)
    PuTTY
    HyperTerminal
    IOS
    Internet Explorer
    • PuTTY
    • HyperTerminal
    • Internet Explorer

What would you like to do?

Home > Flashcards > Print Preview