1/119
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
____ protocols, such as TCP, require an acknowledgment (ACK) of the receipt of data packets.
Connection-oriented
he ____ sublayer of the Data Link layer defines the media access method and provides a unique identifier for the network card.
MAC
A ____ spans multiple geographic areas and is usually connected by common telecommunication carriers.
WAN
A ____ is contained within a company or department and located in a single geographic area, usually a building or part of a building.
LAN
The part of the company's network that allows access to nonemployees is called the ____, which is accessed over or through the Internet.
extranet
Because the MAC address is added during the manufacturing process, it is a permanent marking. For this reason, the address is also known as a ____.
BIA
The term ____ refers to a series of storage devices, such as tapes, hard drives, and CDs, that are networked together to provide very fast data storage for a network or subnetwork.
SAN
The term ____ refers to the wire cabling, such as coaxial or the more commonly used twisted-pair, that form the connections in most networks.
Media
The protocols at the Network layer allow computers to route packets to remote networks using a ____ address.
logical
The ____ sublayer of the Data Link layer defines how data is packaged for the network.
LLC
A(n) ____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production.
MAC
A(n) ____, which is also known as a header or a trailer, is specific information that is sent from one layer on the source computer to the same layer on the destination computer.
PDU
The OSI model ____ layer defines the mechanical, electrical, and procedural events that occur during the physical transmission of electronic signals on the wire.
Physical
The seven layers of the OSI reference model communicate with one another via ____ communication.
Peer
____ protocols, such as User Datagram Protocol (UDP), do not require an ACK.
Connectionless
Each layer in a protocol stack may add a(n) ____ to the data as it is passed down the layers.
PDU
The term ____ refers to the intermediate stage between a LAN and a WAN.
MAN
The part of the company's network that allows access to employees is called the ____, which is completely separate from the Internet.
intranet
____ networks have computers that are servers and computers that act as clients to those servers
Client/server
Data sent by a connectionless transport is called a ____.
datagram
Fast Ethernet is defined under the IEEE ____ standard.
802.3u
In ____ communications, devices can send and receive signals, but not at the same time.
half-duplex
____ have the most negative effect on network performance.
Gateways
In ____ communications, devices can send and receive signals simultaneously.
full-duplex
On analog networks, devices that boost the signal are called ____.
amplifiers
If a single access point is available in infrastructure mode, then the mode is said to be a(n) ____.
Basic Service Set (BSS)
____ provide filtering and network traffic control on LANs and WANs. These devices can connect multiple segments and multiple networks
Routers
Ethernet uses ____ to prevent data packets from colliding on the network.
CSMA/CD
____ are commonly used to connect networks to the Internet.
Routers
____ increase network performance by reducing the number of frames transmitted to the rest of the network
Switches
Typically WLANs involve multiple access points connected to various switches in the network. This type of infrastructure mode is known as a(n) ____.
Extended Service Set (ESS)
A ____ is the physical area in which a frame collision might occur.
collision domain
A ____ filters traffic between network segments by examining the destination MAC address.
bridge
Routers operate at the ____ layer of the OSI model.
Network
A(n) ____ functions as both a bridge for nonroutable protocols and a router for routable protocols.
brouter
Devices that "see" the traffic of other devices are said to be on the same ____ as those devices.
collision domain
When TCP/IP is used on an internetwork, the logical address is known as a(n) ____ address.
IP
____ is a network access method (or media access method) originated by the University of Hawaii.
Ethernet
A(n) ____ is usually a combination of hardware and software. Its purpose is to translate between different protocol suites.
Gateway
Switches filter based on ____ addresses.
MAC
____ protocols allow the routers to be updated automatically.
Routing
____ is the process of assigning unique IP addresses to devices on the network.
IP addressing
Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These tables are called ____.
ARP tables
____ is a communication method for network devices that is designed to reduce the flow of packets from their source.
Congestion avoidance
The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.
Internetwork
The invention and evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite resulted from a coordinated effort by the U.S. ____.
DoD
The Cisco ____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow.
Three-Layer Hierarchica
____ provides the same basic functionality as RARP.
DHCP
The ____ protocol provides a connectionless delivery service
IP
The ____ layer of the TCP/IP model maps to both the Data Link and Physical layers of the OSI reference model.
Network Interface
____ is a connection-oriented protocol that allows you to connect your computer to other computers on the Internet and view Web page content.
HTTP
Trace shows the exact path a packet takes from the source to the destination. This is accomplished through the use of the ____ counter.
TTL
The ____ layer in the TCP/IP model handles software, or logical, addressing.
Internetwork
The ____ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layers.
Application
A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device.
ICMP flood
The ____ layer in the TCP/IP model determines the connectionless or connection-oriented services.
Transport
A router references its ____ to determine which of its interfaces is connected to the destination network.
routing table
The TCP/IP ____ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control.
Transport
A(n) ____ supplies the MAC address of the destination host in a unicast packet.
ARP reply
Network administrators and support personnel commonly use the ____ utility to verify connectivity between two points.
Ping
The CIDR addressing method allows the use of a ____ to designate the number of network bits in the mask.
prefix
The decimal number 192 expressed in binary is ____.
11000000
A(n) ____ address identifies both a network and a host, so you can route communications through large networks, including the Internet
IP
____ is based on assigning IP addresses on criteria other than octet boundaries.
CIDR
____ tell the computer or router which part of an IP address is the network portion and which part is the host portion.
Subnet masks
The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number.
hexadecimal
Although the base ____ numbering system seems foreign at first glance, largely due to the addition of letters, it really is an efficient way to express large numbers such as MAC and IPv6 addresses.
16
To determine how many digits are used for the network identifier, you must look at the ____, which is a required component for all IP hosts.
subnet mask
____ is the version of IP currently deployed on most systems today.
IPv4
IP Class ____ addresses (also known as multicast addresses) are reserved for multicasting.
D
____ was originally designed to address the eventual depletion of IPv4 addresses.
IPv6
____ broadcasts are for a specific subnet.
Directed
The ____ transition method involves enabling IPv6 on all routers, switches, and end nodes but not disabling IPv4—so both version 4 and version 6 stacks run at the same time.
dual stack
IPv4 networks rely on ____, which is inefficient because many hosts unnecessarily see and partially process traffic not ultimately destined for them.
broadcasting
When the host portion of an IP address is all binary zeros, that address is the ____ identifier.
subnetwork
____ allows a single IP address to provide connectivity for many hosts and is widely used on networks of all sizes.
NAT
____ is the most important layer 3 security protocol.
IPSec
In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on different subnets.
classless
When the host portion of an IP address is all binary ones, that address is a ____ address.
broadcast
____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets.
Tunneling
____ controls what information a router will send out through a particular interface.
Split horizon
____ is a distance-vector routing protocol that broadcasts entire routing tables to neighbors every 30 seconds, out of every interface.
RIP
Static routes are configured by a network administrator using the ____ command.
ip route
You use the ____ command to display the routing table.
show ip route
The Cisco ____ command turns on RIP routing for a network
network
Routers with only one route out are known as ____.
stub routers
The ____ command displays real-time rip updates being sent and received and places very high processing demands on your router, which could affect network performance.
debug ip rip
When IP routing is enabled, you can use the ____ command or the ip route 0.0.0.0 0.0.0.0 command to configure a default route.
ip default-network
The ____ is the time at which a route will be totally removed from the routing table if no updates are received.
flush interval
____ are very powerful, as they allow administrators complete control over path selection.
Static routes
Default routes are sometimes called ____ routes.
quad zero
____ protocols have packet headers that can contain Network layer addresses.
Routed
____, which are the packets used to send out LSAs, allow every router in the internetwork to share a common view of the topology of the internetwork.
LSPs
The ____ command allows you to configure an administrative distance.
ip route
An autonomous system (AS) uses ____ as routing protocols.
Interior Gateway Protocols
____ routing protocols broadcast their entire routing table to each neighbor router at predetermined intervals.
Distance-vector
A ____ route is a type of static route that the administrator configures.
default
The ____ command allows you to set the maximum hop count for IGRP.
metric maximum-hops
Networks with one route to the Internet are called ____.
stub networks
____ is a proprietary protocol suite developed by Novell.
IPX/SPX