Chapter 3
Chapter 3 pt.2
Chapter 4
Chapter 4 pt.2
Chapter 5
100

What TCP header field allows the receiving node to determine whether a TCP segment is corrupted during transmission? 


checksum

100

The _____of a MAC address is unique to each manufacturer. 

OUI

100

Flow control, Sequencing, and Checksums are all properties of what layer 4 protocol?


TCP

100

What is the name for a network connection encrypted from end to end that creates a private connection to a remote network

VPN

100

_____ fiber optic cable is used for long distance data links and provides the highest throughput for Wide Area Networks. 


Single-mode

200

In an IPv4 header, the _____ field indicates how many routers a packet may pass through on a network. 


time to live

200

How many Bits in a MAC Address? 


48 bits

200

Which of the following is an unreliable, connectionless protocol that relies on TCP to ensure messages reach the correct application on the receiving host.


IP (internet protocol)

200

What standard adds the Header and Trailer in Layer 2?

Ethernet

200

The minimum category of UTP cable required in order to support Gigabit Ethernet speeds is CAT _____.


Cat 5e

300

Management protocol for IPv4 that provides hosts with information about network problems and is used for network error reporting, and sends and receive echo requests.


ICMP

300

The protocol responsible for providing IP addresses to network hosts



DHCP

300

Protocol that works in conjunction with IPv4 to discover the MAC address of a host or node on the local network

ARP

300

What is different between TFTP and SFTP?

SFTP provides authentication and encryption where as TFTP provides neither.

300

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair? 


Tone Locator

400

A host name-to-address resolution protocol


DNS

400

Which computers are the highest authorities in the Domain Name System hierarchy?

Root Server

400

List a name of a protocol used to encrypt TCP/IP transmissions.

TLS, SSL (layer 4+),  IPSec (layer 3)

400

What type of Key Encryption uses two separate keys?

Public Key encryption 

400

A ______ Cable reverses all of the wires and is used to connect a PC to the console port of a router.

Rollover Cable

500

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another external network?



Default Gateway

500

A technique designed to conserve public IP address needed by a Network?


NAT (Network Address Translation)

500

The CIA Triad consists of what three things

Confidentiality, Integrity, Availability

500

What utility displays TCP/IP statistics and details about connections such as what port they use? 

-Tracert

-Nmap

-Ipconfig

-Netstat

Netstat

500

The primary difference between multi-mode and single-mode optical fiber construction is the _____. 


Diameter of the core

M
e
n
u