-
What identifies a PC on a network?
IP address
-
How many host nodes are supported on a single Class C network?
254
-
Which
of the following utilities enables a machine to check whether or not it can
communicate with another machine?
Ping
-
What is the default subnet mask for Class C addresses?
255.255.255.0
-
At what layer of the OSI model does the IP protocol handle IP
addressing?
Network
-
Which device is used to perform a loopback test on a NIC?
Loopback plug
-
Which operating systems install both IPv4 and IPv6 by default?
- Windows Vista
- and Windows 7
-
What type of topologies are star ring and star bus considered?
Hybrid
-
How many bits make up a complete MAC address?
48
-
Which Ethernet technology supports speeds up to 1 Gbps?
1000BaseT
-
What kind of cable is most commonly used in 10/100/1000BaseT Ethernet
star bus topology networks?
UTP
-
What central connection box is used in Ethernet star bus networks?
Switch
-
Which of the following provides data speeds up to 1 Gbps?
CAT 5e
-
Which type of cable is shielded to protect from EMI?
STP
-
Of the following, which standard uses UTP cabling?
1000BaseT
-
What are the two TIA/EIA standards for connecting RJ-45 connectors to
the UTP cable?
568A and 568B
-
What do most fiber Ethernet networks use?
62.5/125 multimode cable
-
Which is not a fiber connector?
BNC-T
-
What is used to map IP addresses to corresponding domain names?
DNS
-
What should you enter at a command prompt to see all of your TCP/IP
settings?
IPCONFIG /ALL
-
What is the standard connector used for UTP Ethernet
installations?
RJ-45
-
What type of cable can be used to connect two systems together without
using a hub or switch?
Crossover
-
What is the default subnet mask for Class A addresses?
255.0.0.0
-
A(n) ____________________ protocol defines everything necessary to get
data from one computer to another.
hardware
-
Every network interface card (NIC) has a built-in identifier called the
____________________ address.
-
Modern domain-based networks use a(n) ____________________ to store
user and computer account information.
directory service
-
In a TCP/IP network, the ____________________ combines with the IP address to
determine the subnet
subnet mask
-
In a domain-based network environment, one or more dedicated servers
called ____________________ hold the security database for all systems.
domain controllers
-
The three organizational groups for network operating systems (NOSs)
are client/server, peer-to-peer, and ____________________.
domain based
-
NIC LEDs, also known as ____________________ give you clues about
what's happening with your network connection.
link lights
-
By default, the TCP/IP protocol is configured to receive an IP address
automatically from a(n) ____________________ server on the network.
Dynamic Host Configuration Protocol
-
When you set the IP address manually, the IP address will not change
and is called a _____
static IP address
-
Networks based on Windows 2000/XP/Vista/7 don't use WINS; they use an improved DNS called
dynamic DNS
-
____________________ enables NetBIOS network names such as SERVER1 to
correlate to IP addresses.
Windows Internet Name Service
-
DNS names that end with .com, .edu, .org, .net, or .uk are called ____________________.
top-level domains
-
The ____________________ provides a common point for connection for network devices.
hub or switch
-
Ethernet networks commonly connect via a cable called ____________________.
unshielded twisted pair
-
My Network Places in Windows 2000/XP is called ____________________ in Windows Vista/7.
Network
-
The most famous TCP/IP service is called ____________________, the language of the World Wide Web.
HTTP
-
Common TCP/IP session types use destination port numbers ranging from __ to __
0, 1023
-
The IPv4 loop back address is _____
127.0.0.1
-
The IP address 2001:0db8:85a3:0000:0000:8a2e:0370:7334 is an example of a/an __________ address.
IPv6
-
Part of an IP address identifies the network, and part identifies the ______ address on the network.
host
-
The Internet uses the ____ protocol.
TCP/IP
-
On a network, data moves from one PC to another in discrete chunks called ____.
packets
-
To have network connectivity, you need a ___, ____, and _____
NIC, Protocol, Network client
-
Machines that connect LANs together are called _____
routers
-
To change your computer description, workgroup, or domain in Windows
Vista, go to the Computer Name tab in ____
System Properties
-
Directory Services and dedicated controllers are used in a(n) __-based network.
domain
-
A(n) ____ network enables any or all machines on a network to act as a server.
peer to peer
-
You are setting up a broadband
connection for your home computer. A UTP cable is used to connect to the cable
modem. What does the other end of the UTP cable connect to?
Network interface card (NIC)
-
What is the router to which you connect
at the ISP called?
Default gateway
-
The Integrated Services Digital Network
(ISDN) sends telephone transmissions across what type of lines?
Digital
-
What kind of cable does broadband cable
use to provide high-speed Internet access?
Regular cable TV cables
-
What port numbers are used by FTP?
20 and 21
-
What component in the computer converts
individual serial bits of data into 8-bit parallel data that the PC can understand?
Universal Asynchronous Receiver/Transmitter (UART)
-
The Internet consists of millions of
computers all over the world interwoven together through long-distance,
high-speed, fiber-optic networks. What are these called?
Backbones
-
Tier 1 and Tier2 providers lease their
Internet connections to ____.
Internet service providers (ISPs)
-
What tool enables multiple computers to
use the Internet connection provided by one computer on the network?
Internet Connection Sharing (ICS)
-
What service provides the structure for
the World Wide Web?
Hypertext Transfer Protocol (HTTP)
-
Which of the following transfers data
via analog signals?
Telephone wire
-
Dial-up links to the Internet use PPP.
What is PPP?
A protocol
-
The Internet was designed to survive
failures. What model does it use to achieve this?
Decentralized
-
How many lines does the Basic Rate
Interface (BRI) setup use?
One
-
What is the unit of measurement, also
known as one cycle per second, that expresses the speed of phone lines?
Baud
-
Broadband cable typically offers speeds
of 1-10 Mbps for upload. What is the typical speed for download?
6-50+ Mbps
-
What port number is used by HTTPS?
443
-
Almost all ____ modems connect to a PCI
or PCI Express expansion bus slot inside the PC.
Internal
-
What device converts analog signals to
digital and vice versa, enabling computers to talk to each other via standard
commercial telephone lines?
Modem
-
What type of signal does a computer use
to communicate?
Digital
-
Flow control or hardware handshaking
uses two signals. One signal, ____________________, is used to indicate when a
computer wants to send data. The other signal, ___________________, is used to
indicate when the receiving computer is ready to receive the data.
ready to send, clear to send
-
Almost all ____________________ modems
connect to a PCI or PCI Express expansion bus slot inside the PC.
internal
-
External modems can convert __
signals to digital and vice versa.
analog
-
Internet Connection Sharing (ICS)
enables one system to share its Internet connection with other systems on the
____________________.
network
-
Satellite connections to the Internet
get the data beamed to a/an ____ on a house or an office.
satellite dish
-
V standards are international standards
for ____________________ technology.
modem
-
ISDN service consists of
_____ channels and ____ channels.
Bearer (B), Delta (D)
-
Internet backbones span the major cities
of the Earth and interconnect at special locations called
Network access points
-
Dial-up links to the Internet have their
own hardware protocol called ____________________.
Point to Point Protocol
-
Both DSL and cable modem Internet
connections can be used by two or more computers if they are part of a(n)
____________________.
local area network
-
Which of the following is not considered grayware?
Phishing
-
What word describes the process of cleaning up after a virus infection?
Remediation
-
Physical security, authentication, the file system, users and groups,
and security policies combine to make what?
Access control
-
How does a computer determine who can or should access it?
Authentication
-
A user has a credit card-sized card used to prove her identity with a PIN. What is this card called?
Smart card
-
What could a computer use to determine a user's identity with the most authority?
Biometric device
-
Sally is a member of multiple groups. A file has been granted different permissions to the different groups. What is Sally's effective permission?
Combined permissions of all groups
-
To lock down security settings on a single computer in a workgroup, what would you use?
Local Security Settings
-
To lock down security settings on a single computer in a domain, what would you use?
Group Policy
-
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
Virus
-
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS
settings)?
Trojan
-
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
Worm
-
Together, what are viruses, Trojans, and worms called?
Malware
-
Antivirus programs can passively monitor your computer's activity. In
this mode, what are they called?
Virus shields
-
To make sure antivirus programs are as useful as possible, what should be updated regularly?
Signatures
-
What type of virus attempts to change its signature to prevent detection by antivirus programs?
Polymorph
-
What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your
system?
Spyware
-
What type of program isn't destructive by itself but leaches bandwidth in networks?
Grayware
-
Access control is the process of implementing methods to ensure unauthorized users can't access your system. Two primary methods are physical security and ____________________.
authentication
-
Windows XP and later come with an excellent software firewall, called the _______
Windows Firewall
-
A(n) ____________________ is a device or software (or combination of both) used to protect an internal network from unauthorized access from the Internet.
firewall
-
Surprise browser windows that appear automatically when you visit a Web site are
pop-ups
-
Unsolicited e-mail is more commonly known as ____________________.
spam
-
The list of viruses your antivirus program can recognize is called the _____ file.
definition
-
The scrambling code used to attempt to modify a(n) __ virus to prevent detection is actually used as the signature to detect the
virus.
polymorph
-
Boot sector viruses that use various methods to hide from antivirus software are known as ____ viruses.
Stealth
-
To detect executable viruses, an antivirus program uses a library of _______
signatures
-
A complete program that travels from machine to machine through computer networks and can cause so much activity that it can overload a network is a(n) ____.
worm
-
A program that looks useful, such as a game or a utility, but is actually maliciously doing something else to the system is known as a/n
____________________.
Trojan
-
Malicious software is also known as ____________________.
malware
-
The tool used to apply policy settings to multiple computers in an Active Directory domain is
Group Policy
-
The tool used to set local policies on an individual system is
____________________.
Local Security Settings
-
Sally is member of the Sales group and the Marketing group. The Marketing group has Full Control permission to a folder named NewProducts, and the Sales group has Read permission to the same folder. Sally's permission to the folder is ____________________?
Full Control
-
A device that can prove who you are based on your fingerprint is known as a(n) ______ device.
biometric
-
What is another name for the Service Set
Identifier parameter?
Network name
-
Most WAPs support filtering in which
data packets that do not contain the appropriate address are rejected. What
kind of address is filtered?
MAC
-
Which of the following provides a
security improvement in WPA addresses over WEP?
EAP
-
Which of the following wireless
networking standards supports data throughput of up to 11 Mbps?
802.11b
-
What is the theoretical maximum range of
the 802.11a wireless networking standard?
150 feet
-
At what frequency range does the
802.11a-based wireless technology operate?
5 GHz
-
At what frequency range do the 802.11b-
and 802.11g-based wireless technologies operate?
2.4 GHz
-
What is the speed at which the 802.11g
wireless technology transfers data?
54 Mbps
-
What is the central connection point for
a wireless network working in infrastructure mode?
WAP
-
What is the maximum capacity for data
transfer between infrared devices?
4 Mbps
-
Which of the following represents a
security improvement in WPA2 over WEP and WPA?
AES
-
How many bits does WEP encryption use to
scramble data packets?
40
-
What device centrally connects wireless
network nodes in the same way that a hub or switch connects wired Ethernet
PCs?
Wireless access point
-
What method do wireless networks use to
determine if other nodes are currently broadcasting?
CSMA/CA
-
What 802.11n feature increases its range
and speed?
MIMO
-
What frequencies does 802.11n use?
2.4 and 5 GHz
-
What wireless technology is often used
to connect headsets to smartphones?
Bluetooth
-
What is a very small wireless network
preconfigured to do a specific job called?
PAN
-
What is the maximum distance of a Class
3 Bluetooth device?
1 meter
-
What enables you to connect to the
Internet through a PDA, cell phone, or smartphone?
Cellular wireless network
-
What type of wireless network can
quickly be used to share files, folders, and printers without a WAP?
Ad hoc
-
Today, which of the following is not
considered a good security practice when setting up a WAP?
Enable WEP encryption
-
What allows you to specifically allow or
deny access to a WAP?
MAC filtering
-
A service area that is extended by
adding WAPs is called a/an _____________.
Extended Basic Service Set
-
Changing the default___ for a WAP is the first step in setting up a new wireless
network.
SSID
-
You should place a WAP with an
omnidirectional antenna in the __ of an area where you want wireless coverage.
center or middle
-
With ____________________ 802.11n WAPs,
you can choose which band to put 802.11n traffic on,
dual band
-
Almost all wireless headsets are now
____________________.
Bluetooth
-
You can easily add wireless Ethernet and
Bluetooth capabilities using ___________________ adapters.
USB, PCI, PCIe, or PC Card
-
A(n) ____________________ enables you to
connect to the Internet through a network-aware PDA, cell
cellular wireless network
-
The IEEE organization has made
first-generation Bluetooth the basis for its 802.15 standard for wireless
Personal Area Networks
-
Like 802.11g, ____________________ WAPs
can run in the 2.4 GHz ISM band, supporting earlier, slower 802.11b/g devices.
802.11n
-
Microsoft Windows fully supports the
IEEE ____________________ standard, more commonly known as
____________________, to lock down wireless networks.
802.11i, WPA2
-
____________________ is a handy way of
creating a type of "accepted users" list to limit access to your wireless network and Internet routers.
MAC address filtering
-
Two or more wireless nodes communicating in ad hoc mode form what's called a(n)
Independent Basic Service Set
-
Devices such as ____________________ and
____________________ can cause a great deal of interference.
cordless phones, microwaves, baby monitors
-
A(n) ____________________ combines an
infrared transceiver with an Ethernet NIC and translates the IrDA protocol into
an Ethernet signal.
infrared access point
-
IrDA links are direct ______ and are susceptible to interference.
line of sight
-
The maximum distance between infrared
devices is ____________________ meter.
1
-
Communication between infrared devices
is enabled in ____________________ mode.
ad hoc
-
Products that adhere to the 802.11b
standard provide a maximum of ____________________ channels
14
-
The 802.11g standard is backward
compatible with ____________________.
802.11b
-
The IEEE 802.11 wireless Ethernet
standard defines methods by which devices may communicate using ____________ radio waves.
spread spectrum
-
WPA2 uses the ____________________ for
encryption.
Advanced Encryption Standard
-
Wireless networks running in _____ mode use one or more wireless access points to connect the
wireless network nodes to a wired network segment.
infrastructure
-
To protect wireless systems, turn off
SSID ____________________.
broadcasting
-
Wireless devices operate using the
____________________ networking scheme.
CSMA/CA
-
To protect wireless systems, the default
SSID name should be ____________________.
renamed
-
Wireless access points can act as
high-speed ________ and Internet routers.
switches
-
Wireless networks using infrared light
are limited to those that use the ___________ protocol.
IrDA
|
|