Objective 2.0 Networking

Primary tabs

No Description Set

Bookmark to learn: Login to use bookmarks.

Bookmark to learn: Login to use bookmarks.

Add to collection ... add Objective 2.0 Networking to your collections:

Help using Flashcards ...just like in real life ;)

  1. Look at the card, do you know this one? Click to flip the card and check yourself.
  2. Mark card Right or Wrong, this card will be removed from the deck and your score kept.
  3. At any point you can Shuffle, Reveal cards and more via Deck controls.
  4. Continue to reveal the wrong cards until you have correctly answered the entire deck. Good job!
  5. Via the Actions button you can Shuffle, Unshuffle, Flip all Cards, Reset score, etc.
  6. Come back soon, we'll keep your score.
    “Repetition is the mother of all learning.”
  7. Signed in users can Create, Edit, Import, Export decks and more!.

Bookmark to learn: Login to use bookmarks.

Share via these services ...

Email this deck:

Right: #
Wrong: #
# Right & # Wrong of #

A switch connects nodes together in a single network, establishing a virtual circuit between any two network nodes. How does the switch perform this function?

It receives frames into a port buffer and reads the destination MAC address from the Ethernet frame.
[Receiving frames is a function of a switch where the frames are received into a port buffer. The switch then reads the destination MAC address from the Ethernet frame. The switch then uses its MAC address table to look up the port connected to the destination MAC address and sends the frame.]

Which type of networking problem does encryption help resolve?

Unsecured traffic is easily intercepted by authorized devices snooping on the network.
[Encryption scrambles the messages being sent over a network so that anyone intercepting them is not able to capture any valuable information.]

Which device limits network broadcasts and segments Internet Protocol (IP) address ranges?

Router
[Routers are devices designed to filter and transfer data packets between dissimilar types of computer networks by assigning a local Internet Protocol (IP) address to each of the devices.]

What is the Internet Control Message Protocol (ICMP)?

The protocol that delivers status and error messages at the network layer
[ICMP (Internet Control Message Protocol), which works at the network layer, delivers status and error messages and is used by diagnostic utilities such as ping and tracert.]

What distance between hosts could mean multiple connected networks in the same municipality?

MAN (Metropolitan Area Network)
[MANs (Metropolitan Area Networks) are an area equivalent to a city or other municipality. It could mean a company with multiple connected networks within the same metropolitan area – so larger than a LAN (Local Area Network) but smaller than a WAN (Wide Area Network).]

In a large network, to which of the following devices would you assign a static Internet Protocol version 4 (IPv4) address?

Proxy server
[A proxy server must have a static IP address. User machines are configured with the proxy’s IP address and pass Internet requests to it.]

What service uses port 22?

Secure Shell (SSH)
[Secure Shell (SSH) over TCP port 22 is used to securely connect to a remote host (typically via a terminal emulator) and was designed to replace programs such as Telnet and FTP.]

Which generation of cellular digital communications standards typically delivers around 20 Mbps in practice?

LTE
[Long Term Evolution (LTE) is a converged 4G standard supported by all network providers. LTE has a maximum downlink of 150 Mbps in theory, but around 20 Mbps is typical of real-word performance.]

Which generation of cellular digital communications standards is supposed to deliver a minimum of 100 Mbps for access from moving users?

5G
[5G is supposed to deliver a minimum of 100 Mbps for access from a fast-moving vehicle and 1 Gbps for stationary users. Speeds of up to 70 Gbps have been achieved under test conditions.]

In Windows Firewall properties, how can you prevent a specific port from receiving traffic?

Use the “Allow” state for inbound connections and create a rule to block the port.
[When using the “Allow” state for inbound connections, you must create rules for any incoming connections you wish to block.]

Which of the following is the addressing scheme that uses a 32-bit number for each address?

IPv4
[An IPv4 address is a 32-bit number. It consists of 4 octets displayed in dotted decimal notation.]

Which type of server uses a distributed database that contains information on domains and hosts within those domains?

DNS server
[Domain Name System (DNS) servers allow users to access resources using host names and Fully Qualified Domain Names (FQDN) by resolving those names to IP addresses. It uses a distributed database that contains information on domains and hosts within those domains.]

Which command line tool can be used to establish if a link is working?

ping
[The ping utility is a command-line diagnostic tool used to test whether a host can communicate with another host on the same network or on a remote network. It is the basic tool to use to establish that a link is working.]

Under 802.1X, what is the term for the device that checks credentials?

Authenticating server
[The authenticating server checks the credentials passed by the authenticator and grants or denies access.]

How do you configure a proxy server in Windows?

Click the LAN Settings button on the Connections tab of the Internet Options dialog.
[To configure a proxy server in Windows, click the LAN Settings button and check the box to use a proxy server. Then, you can enter the address and port for the proxy server.]

What service uses port 80?

HyperText Transfer Protocol (HTTP)
[The HyperText Transfer Protocol (HTTP) uses port 80. HTTP enables clients (typically web browsers) to request resources from an HTTP server.]

What service uses port 110?

Post Office Protocol 3 (POP3)
[The Post Office Protocol 3 (POP3) uses port 110. POP3 is an Internal mail protocol for retrieving emails.]