Microsoft MTA Exam
|
|
|
- Nathaniel Lane
- 9 years ago
- Views:
Transcription
1 Microsoft MTA Exam Vendor:Microsoft Exam Code: Exam Name: Networking Fundamentals
2 QUESTION 1 What is the most common central device used today to connect computers to a network? A. hub B. switch C. SOHO router D. VPN router QUESTION 2 What is the most common adapter or connector used to connect a computer to a wired network? A. RG6 B. RG58 C. RJ45 D. RJ8 QUESTION 3 Which of the following does a switch use for increased performance? A. simplex B. half duplex C. full duplex D. sliding duplex QUESTION 4 What do you use to isolate a group of computers within your organization? A. WLAN B. WAN C. VLAN D. Internet QUESTION 5 What do you use to create VLANs?
3 A. router B. switch C. firewall D. proxy server QUESTION 6 What zone is used to publish external websites for an organization? A. intranet B. exanet C. internetwork D. DMZ QUESTION 7 Which topology is the most redundant and the most expensive? A. star B. ring C. mesh D. bus QUESTION 8 What standard describes CSMA/CD? A B C D QUESTION 9 What mechanism do wireless networks use to access the network?
4 A. CSMA/CD B. CSMA/CA C. token passing D. polling QUESTION 10 What model promises the most processing power? A. centralized computing B. distributive computing C. switching computing D. dumb computing QUESTION 11 Which model users a central database for authentication? A. peer-to-peer B. workgroup C. client/server D. distributive QUESTION 12 What type of server does Active Director run on? A. file server B. print server C. database server D. network controller QUESTION 13 Which model has each host have their own security database? A. peer-to-peer
5 B. client/server C. distributive D. sliding QUESTION 14 What type of communication is sent to a single designated host? A. unicast B. broadcast C. multicast D. anycast QUESTION 15 What is used to uniquely identify a host on a TCP/IP network? A. IP address B. MAC address C. bit pattern D. router name QUESTION 16 A is a single computer or device that connects to a TCP/IP network. A. Host B. Node C. Access Point D. Laptop B QUESTION 17 What is the central device used in wireless LANs? A. Wireless Access Point B. CSA/CDM Connector
6 C. Wireless Switch D. MDU QUESTION 18 What command do you use to test the TCP/IP stack on a computer? A. Ping localhost B. Ping C. Ping loopback D. ipconfig /renew BC QUESTION 19 You need to divide a network into three subnets. Which Device should you use? A. Router B. Hub C. Segmenter D. Bridge QUESTION 20 Connecting to a private Network address from a public network requires: A. Dynamic Host Configuration Protocol (DHCP). B. Network Access Protection (NAP). C. Dynamic domain name system (DDNS). D. Network address translation (NAT). QUESTION 21 What model is used to describe how data communication occurs between hosts? A. server-centric model B. workgroup model C. peer-to-peer model
7 D. OSI reference model QUESTION 22 Which layer in the OSI model do MAC addresses and switches use? A. Physical B. Data Link C. Network D. Transport QUESTION 23 Which layer in the OSI model covers routing between networks? A. Physical B. Data Link C. Network D. Transport QUESTION 24 Which layer in the OSI model is used to verify that data was delivered without error? A. Physical B. Data Link C. Network D. Transport QUESTION 25 Which layer in the OSI model covers HTTP, FTP, and RDC? A. Physical B. Session C. Application D. Presentation
8 QUESTION 26 Which layer of the OSI model is used to create a connection so that a host can transfer files? A. Physical B. Session C. Application D. Presentation QUESTION 27 Which layer of the OSI model includes VLANs? A. Physical B. Data Link C. Network D. Transport QUESTION 28 Which protocol do you use as the transport protocol for a video application? A. TCP B. UDP C. FTP D. RDC QUESTION 29 Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS? A. well-known ports B. registered ports C. dynamic ports D. private ports
9 QUESTION 30 What layer in the OSI model is responsible for logging on and off? A. Physical B. Session C. Application D. Presentation QUESTION 31 What layer in the OSI model is used to encrypt data? A. Physical B. Session C. Application D. Presentation QUESTION 32 Which layer in the OSI model includes the cable and network adapters? A. Physical B. Session C. Application D. Presentation QUESTION 33 How many layers does the TCP/IP model have? A. 3 B. 4 C. 6 D. 7
10 QUESTION 34 Which layer in the OSI model is included in the TCP/IP model? A. Physical B. Data Link C. Transport D. Application QUESTION 35 Which protocol is used to translate IP addresses to MAC addresses? A. RARP B. ARP C. DNS D. WINS QUESTION 36 What ports are defined above 49,152? A. well-known ports B. registered ports C. dynamic ports D. sliding ports QUESTION 37 A layer 3 switch is similar to a. A. Router B. Repeater C. Hub D. Patch Panel
11 QUESTION 38 TCP/IP and IPX/SPX are known as stacks. A. Protocols B. Services C. Layers D. Lenses QUESTION 39 What is the advantage of UDP over TCP? A. Less Overhead - Faster Performance B. Older - Larger pool of compatible hardware C. TCP is not IPv6 compatible UDP is D. UDP can operate at Layer 1 QUESTION 40 What are the seven layers found in the OSI model, in order? A. Physical - Data Link - Network - Transport - Session - Presentation - Application B. Physical - Data Link - Network - Transport - Session - Application - Presentation C. Physical - Data Link - Transport - Network - Session - Application - Presentation D. Physical - Data Link - Transport - Session - Network - Presentation Application QUESTION 41 What is the maximum speed supported by b? A. 1 Mbps B. 10 Mbps C. 11 Mbps D. 54 Mbps
12 QUESTION 42 One reason to incorporate VLANs in a network is to: A. Reduce the number of broadcast domains. B. Increase the number of available Media Access Control (MAC) addresses. C. Increase the number of available IP addresses. D. Reduce the number of nodes in a broadcast domain. QUESTION 43 What is the minimum cabling requirement for a 100BaseTx network? A. Category 3 UTP cable B. Category 5 UTP cable C. Category 6 UTP cable D. Multimode fiber cable QUESTION 44 A router's static route is set by the: A. Next upstream router. B. Routing protocol. C. Adjacent network. D. Network administrator. QUESTION 45 What type of record does DNS use to find a mail service? A. Host (A) DNS record B. Canonical (CNAME) DNS record C. Service (SRV) DNS record D. Mail Exchanger (MX) DNS record QUESTION 46
13 How many bits are there in an Internet Protocol version 6 (IPv6) address? A. 32 B. 64 C. 128 D. 256 QUESTION 47 In which OSI layer does routing occur? A. Physical B. Network C. Data Link D. Transport QUESTION 48 The query protocol used to locate resources on a network is: A. Tracert B. Telnet. C. Lightweight Directory Access Protocol (LDAP). D. User Datagram Protocol (UDP). QUESTION 49 What is the most common cable used today? A. UTP B. STP C. Coaxial D. Fiber QUESTION 50 If you are making a crossover cable and one end is 568A, what should the other end be?
14 A. 568A B. 568B C. 568C D. BOGB QUESTION 51 If you want to connect a computer directly to another computer without using a switch, you use a. A. straight-through cable B. crossover cable C. laplink cable D. rollover cable QUESTION 52 You need to connect a twisted-pair cable to the back of a patch panel. What tool should you use? A. punch-down tool B. zip tool C. wire wedge D. soldering iron QUESTION 53 What is the minimum category of twisted-pair cable you need to support 100 Mbps? A. Category 3 B. Category 5 C. Category 5e D. Category 6 QUESTION 54 When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem?
15 A. EMI B. RFI C. network adapter failure D. cable failure QUESTION 55 You are setting up a network within a warehouse using Category 6 UTP. However, parts of the network are down because of the heavy machinery used. What cable type should you use? A. STP B. coaxial C. fiber D. plenum-rated QUESTION 56 What do you call it when electrical signals jump to another set of wires? A. EMI B. RFI C. crosstalk D. jump it is QUESTION 57 What type of cable should be used as part of a fire code for a building? A. STP B. PVC C. heat protected D. plenum-rated QUESTION 58
16 Which of the following is not a fiber connector? A. FC B. LC C. RJ-45 D. MT-RJ QUESTION 59 Which of the following is a characteristic of single-mode fiber? A. Single-mode fiber supports longer distances than multimode fiber. B. Single-mode fiber has increased bandwidth than multimode fiber. C. Single-mode supports only a ring topology. D. Single mode allows multiplexing of electrical and light signals. QUESTION 60 Which protocol can be used to encrypt packets on the Internet? A. HTTP B. SNMP C. HTTPS D. TFTP QUESTION 61 What is the maximum speed supported by g? A. 1 Mbps B. 10 Mbps C. 11 Mbps D. 54 Mbps QUESTION 62 What of the following is not a characteristic of n?
17 A. frame aggregation B. channel bonding C. RFI protection D. MIMO QUESTION 63 Which is the most secure encryption used in wireless networks? A. WEP B. WPA C. WPA2 D x QUESTION 64 What is used to identify a wireless network? A. network ID B. frequency identifier C. wireless password D. SSID QUESTION 65 To test a cable, you would use a. A. Continuity tester B. Patch Tester C. Loopback Plug D. Tone & Probe QUESTION 66 For organizations, using authentication for wireless networks is recommended.
18 A d B x C g D x QUESTION 67 When a signal degrades as it runs through a wire, you have. A. Degradation B. Attenuation C. Cross Over D. Resistance QUESTION 68 What mode users a wireless access point? A. Infrastructure Mode B. Ad Hop Mode C. Bridge Mode D. Forward Tunneling Mode QUESTION 69 What command do you use to connect to a FTP server to download a file? A. nslookup B. ssh C. telnet D. ftp QUESTION 70 Which of the following is a public IP address? A
19 B C D QUESTION 71 What is the default subnet mask for a Class B network? A B C D QUESTION 72 You have a host with the address of To what class would this be address be assigned? A. Class A B. Class B C. Class C D. Class D QUESTION 73 For IPv4, what class is used for multicasting? A. Class A B. Class B C. Class C D. Class D QUESTION 74 What is the maximum number of hosts you can use for each subnet that belongs to a class C address?
20 A. 128 B. 254 C. 256 D. 65,534 QUESTION 75 What type of address is ? A. multicast address B. broadcast address C. unicast address D. anycast address QUESTION 76 What type of address is used to send a single set of packets to multiple hosts? A. multicast address B. broadcast address C. unicast address D. anycast address QUESTION 77 Which of the following is not a private address? A B C D QUESTION 78 What type of address is ?
21 A. APIPA B. multicast address C. anycast address D. broadcast address QUESTION 79 You have a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of What is the problem? A. The host cannot find a DHCP server. B. The host is set to multicast. C. The host is currently broadcasting. D. The host cannot find a domain controller. QUESTION 80 What defines the nearest router for a host? A. subnet mask B. default gateway C. DNS server D. WINS server QUESTION 81 What server is used to translate host names to IP addresses? A. DNS B. WINS C. HOSTS D. DHCP
22 QUESTION 82 What is used to remap private addresses to public addresses and back? A. DNS B. DHCP C. WINS D. NAT QUESTION 83 What do you call a smaller network that is part of a larger network? A. host B. broadcast domain C. cluster D. subnet QUESTION 84 You have a subnet mask of What would the CIDR notation be? A. /16 B. /20 C. /24 D. /28 QUESTION 85 How many bits is an IPv6 address? A. 32 B. 48 C. 64 D. 128 QUESTION 86
23 What type of address is 2001:4212:0000:34DB:0000:0000:0000:4231? A. MAC address B. IPv4 C. IPv6 D. anycast address QUESTION 87 A address is assigned by a DHCP server. A. Static B. Dynamic C. Private Only D. Public Only QUESTION 88 What is the loopback IP address? A B. loopback C D B QUESTION 89 What IPv6 address incorporates IPv4? A. Starting ::ffff: B. Starting 0:0::ffff: C. Ending ::ffff D. Ending 0:0::ffff QUESTION 90 The protocol maps IP addresses to a Media Access Control (MAC) address is:
24 A. Internet Message Access Protocol (IMAP). B. Address Resolution Protocol (ARP). C. Dynamic Host Configuration Protocol (DHCP). D. User Datagram Protocol (UDP). E. Routing Information Protocol (RIP). QUESTION 91 A service that resolves NetBIOS names to IP addresses is: A. Internet Service Provider (ISP). B. Domain Name Service (DNS). C. Windows Internet Name Service (WINS). D. Address Resolution Protocol (ARP). QUESTION 92 What command displays the IP address, subnet mask, and default gateway of the system you are currently on? A. ipconfig B. ping C. tracert D. nslookup QUESTION 93 What protocol does the ping command use to test network connectivity? A. TCP B. UDP C. ICMP D. FTP QUESTION 94 What command do you use to clear the DNS cache on a local system?
25 A. ipconfig /registerdns B. ipconfig /cleardns C. ipocnfig /flushdns D. ipconfig /releasedns QUESTION 95 What command do you use to test a system s IPv4 protocol stack? A. ping B. ping self C. ping D. ping default gateway QUESTION 96 What command do you use to display active TCP or UDP connections? A. nbtstat B. netstat C. ipconfig D. nslookup QUESTION 97 What command is used to display NetBIOS over TCP/IP statistics? A. nbtstat B. netstat C. ipconfig D. nslookup QUESTION 98 What command clears the NetBIOS name cache table? A. nbtstat -r
26 B. nbtstat -R C. nbtstat -RR D. nbtstat -s QUESTION 99 What command tests network connectivity while showing you each hop along the way? A. ping B. nslookup C. nbtstat D. tracert QUESTION 100 What command tests network connectivity while showing you each hop along the way and the degree of packet loss? A. ping B. pathping C. nbtstat D. tracert QUESTION 101 The service that resolves fully qualified domain name (FQDN) to IP addresses is: A. Internet Service Provider (ISP). B. Domain Name Service (DNS). C. Address Resolution Protocol (ARP). D. Windows Internet Name Service (WINS). QUESTION 102 What command do you use to connect to a remote computer so that you can execute commands? A. ftp
27 B. nslookup C. telnet D. nbtstat QUESTION 103 What command can you use to connect to a mail server so that you can test SMTP? A. ftp B. nslookup C. telnet D. nbtstat QUESTION 104 What command do you use to display and modify the network configuration of a local computer? A. netsh B. netstat C. telnet D. nbtstat QUESTION 105 What command is used to add static routes to a Windows computer? A. nslookup B. telnet C. route D. nbtstat QUESTION 106 What command do you use to display the routing table on a local system? A. route display
28 B. route table C. route local D. route print QUESTION 107 What command do you use to display the MAC address on a system? A. ipconfig /all B. pathping -m C. route /showmac D. nbstat -r QUESTION 108 What command do you use to retrieve or update your DHCP assigned configuration? A. ipconfig /flushdns B. ipconfig /all C. ipconfig /release D. ipconfig /renew QUESTION 109 What command do you use to register the computer s name and IP address with the nearest DNS server? A. ipconfig /renew B. ipconfig /renew all C. ipconfig /flushdns D. ipconfig /registerdns QUESTION 110 What command displays Ethernet statistics? A. netstat -e
29 B. netstat -x C. netstat -q D. netstat -t QUESTION 111 What option do you use to ping constantly until you stop it? A. ping -t <host> B. ping -q <host> C. ping -r <host> D. ping -s <host> QUESTION 112 What protocol is used with L2TP to encrypt data? A. IPSec B. MS-CHAP C. MS-CHAPv2 D. MPPE QUESTION 113 The default gateway address identifies the: A. Server that will provide name services for the computer. B. Device that will connect the computer to a remote network. C. Device that will connect the computer to the local network. D. Server that will authenticate the user of the computer. QUESTION 114 What protocol automatically configures IP configuration for a client? A. DNS
30 B. DHCP C. WINS D. FTP QUESTION 115 Which of these ports does DHCP use? A. 80 B. 67 C. 23 D. 500 QUESTION 116 After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server? A. Register the scope B. Register the server C. Authorize the server D. Register the clients QUESTION 117 You have a computer with an address of and a subnet mask of , yet you cannot connect to your local file servers. What is most likely the problem? A. It cannot communicate with a DHCP server. B. The DNS servers specified are incorrect or are down. C. NetBIOS over TCP/IP has not been enabled. D. The network card is not connected properly to the network. QUESTION 118 What name does Windows Server 2008 R2 use for Terminal Services?
31 A. MS Telnet Server B. MS Primary Services C. MS Thin Server D. Remote Desktop Services QUESTION 119 What port does Remote Desktop Services use? A. 443 B. 501 C. 389 D QUESTION 120 What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2? A. Microsoft RAS B. Microsoft RRAS C. Microsoft RDC D. Microsoft VPN Server QUESTION 121 A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is You need to restore access to the network. What should you do next? A. Verify that the DHCP service is available. B. Reset the user's password on the server. C. Flush the cache on the DNS server. D. Check your router's current routing tables.
32 QUESTION 122 Which component of IPSec is generates the encryption and authentication keys? A. SA B. AH C. ESP D. MPPE QUESTION 123 Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality? A. SA B. AH C. ESP D. MPPE QUESTION 124 Which IPsec component includes the most security, including confidentiality? A. SA B. AH C. ESP D. MPPE QUESTION 125 What port does DNS use? A. 443 B. 389 C. 51
33 D. 53 QUESTION 126 What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses? A. DNS B. WINS C. DHCP D. LDAP QUESTION 127 What feature within Windows allows the server to act as a router? A. IPsec B. DHCP C. IP forwarding D. RDC QUESTION 128 You use the to connect to a terminal server. A. Remote Desktop Connection (RDC) B. Remote Desktop Protocol (RDP) C. Remote Session Call (RSC) D. Remote NetBios Connect (RNC) QUESTION 129 What provides name resolution between domain names and IP addresses?
34 A. DHCP B. DNS C. ARP D. RPC QUESTION 130 What allows a user to connect to a corporate network using the Internet? A. VPN B. VPC C. PPTN D. IPSec QUESTION 131 What command do you use to release the IP configuration handed out by a DHCP server? A. ipconfig /renew B. ipconfig /releasedns C. ipconfig /savestatic D. ipconfig /release QUESTION 132 What command do you use to reacquire IP configuration from a DHCP server? A. ipconfig /renew B. ipconfig /releasedns C. ipconfig /savestatic D. ipconfig /release QUESTION 133 List the four steps for a client to get an IP address from a DHCP server in the correct order. A. Discovery Offering Request Acknowledge
35 B. Request Offering Discovery Acknowledge C. Discovery Request Offering Acknowledge D. Request Offering Discovery Acknowledge QUESTION 134 What is the primary disadvantage of X.25? A. digital circuit B. small data payloads C. circuit switching D. slow speeds QUESTION 135 What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network? A. RIP B. OSPF C. BGP D. IGMP QUESTION 136 What routing protocol is the most popular link-state protocol used within a large organization? A. RIP B. OSPF C. BGP D. IGMP QUESTION 137 What technology takes data and breaks them into packets and sends them over a network, sometimes using different routes for each packet?
36 A. circuit switching B. connection switching C. packet switching D. network switching QUESTION 138 X.25 and Frame Relay are examples of what type of WAN technology? A. circuit switching B. connection switching C. packet switching D. network switching QUESTION 139 What device acts as a high-speed modem for a LAN? A. analog modem B. telco incoming router C. packet switcher D. CSU/DSU QUESTION 140 What does X.25 use as its DTE device? A. telco incoming router B. packet switcher C. analog modem D. PAD QUESTION 141 What part of the network is the point where the responsibility of the administrator ends and the telecommunications provider s responsibility begins?
37 A. last mile B. demarc C. router array D. PAD interface QUESTION 142 Which of these addresses is a multicast address? A B C D QUESTION 143 When a packet traverses a network, each router is a. A. jump point B. CSU/DSU C. jump switch D. hop QUESTION 144 When you have multiple circuits connected to a site, the entire circuit is known as a. A. virtual circuit B. emulated circuit C. joined circuit D. multitasked circuit QUESTION 145
38 What replaced X.25? A. Frame Relay B. ATM C. ISDN BRI D. DSL QUESTION 146 At what speed does a T3 line run? A. 1.5 Mbps B. 4.5 Mbps C Mbps D. 128 Mbps QUESTION 147 In Europe, what circuit would be similar to the T1 found in the United States? A. E1 B. J1 C. T2 D. F1 QUESTION 148 How many B channels does an ISDN PRI support? A. 2 B. 8 C. 23 D. 48
39 QUESTION 149 What speed does FDDI use? A. 10 Mbps B. 44 Mbps C. 54 Mbps D. 100 Mbps QUESTION 150 What topology does FDDI use? A. bus B. star C. ring D. mesh QUESTION 151 What technology uses wires from the telephone company to provide broadband Internet connection? A. cable B. DSL C. FDDI D. Frame Relay QUESTION 152 is used to send packets from one network to another network. A. Routing B. Transport C. BGP D. Encapsulation
40 QUESTION 153 is a route that must be manually defined on each router. A. Static B. Dynamic C. Persistent D. Global QUESTION 154 uses a clocking circuit to control the timing of communications between two WAN devices such as routers. A. Static Route B. Dynamic Route C. PPTP Route D. Point To Point QUESTION 155 A is the guaranteed certain amount of information provided by a circuit or line. A. Committed Information Route B. Pivotal Information Route C. Next Hop Policy Route D. Frame x Frame Route QUESTION 156 What speed does a T1 run at? A Mbps B Mbps C Gbps D MBps
41 QUESTION 157 How fast is a DS0 circuit? A. 32 Kbps B. 64 Kbps C. 128 Kbps D Kbps QUESTION 158 What protocol is used with L2TP to provide encryption? A. IPSec B. MPPE C. HTTPS D. MSC-CHAP QUESTION 159 The is the largest WAN in the world. A. Internet B. Intranet C. WWW D. MSDN QUESTION 160 What type of network can you set up that is another company s internal network? A. intranet B. extranet C. internet D. DMZ QUESTION 161
42 What technology can you use temporarily to connect networks from two different companies? A. VPN B. HTTP C. DHCP D. passive router QUESTION 162 Which VPN technology is the most common and the easiest to set up? A. PPTP B. L2TP with IPSec C. SSTP D. CHAP QUESTION 163 What port does L2TP use? A. 501 B C D. 443 QUESTION 164 Which type of firewall blocks packets based on rules that are based on IP addresses or ports? A. packet filtering B. stateful packet inspection C. NAT filtering D. Application-level gateway QUESTION 165 What technology used in firewalls keeps tracks of conversations so that it knows what to allow back
43 into a network? A. stateless packet inspection B. stateful packet inspection C. NAT filtering D. application-level gateway QUESTION 166 What acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future? A. NAT server B. stateful packet inspector C. proxy server D. NIDS QUESTION 167 What type of device is used to detect malicious network activities and reports only those issues to the administrator? A. NIDS B. NIPS C. Internet content filter D. NAT server QUESTION 168 What type of device is designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity? A. NIDS B. NIPS C. Internet content filter D. NAT server
44 QUESTION 169 Which DMZ configuration uses one firewall with three interfaces? A. back-to-back configuration B. three-leg perimeter configuration C. basic configuration D. perimeter configuration QUESTION 170 What stage is the World Wide Web in? A. 1.0 B. 1.1 C. 2.0 D. 3.0 QUESTION 171 Which of the following services masks internal IP addresses from outside the network? A. DHCP B. NAT C. WINS D. DNS QUESTION 172 What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts without further checking? A. proxy server B. application firewall C. NAT filtering D. circuit-level gateway
45 QUESTION 173 What type of firewall do you use to block access to certain websites or instant messengers? A. Internet content filter B. NIDS C. circuit-level gateway D. NAT filtering QUESTION 174 When trying to protect your network, you should create your secure network based on. A. multiple content filters B. a master firewall that all traffic flows through C. a NAT firewall and a proxy server D. layers QUESTION 175 If a router is installed so that it separates DHCP server from its clients, the clients will: A. Immediately lose connectivity to all segments. B. Receive an immediate renew of their lease. C. Be unable to obtain their leases from the server. D. Immediately lose connectivity to the local segment. QUESTION 176 An is the internal network for an organization. A. Internet B. Extranet
46 C. Intranet D. WWW QUESTION 177 What port does PPTP use? A. 80 B C D. 433 QUESTION 178 What device is used to protect one network from another by using filtering packets? A. Firewall B. Point to Point Tunnel C. VPN D. Router QUESTION 179 What type of configuration creates a DMZ between two firewalls? A. Gateway Network B. Perimeter Network C. DMZ D. RADIAUS Server C QUESTION 180 Which type of port is used to support VLAN traffic between two switches? A. LAN port B. Trunk port C. Virtual port
47 D. WAN port QUESTION 181 Tracert is used to: A. report the shortest route between different networks. B. manage routing tables dynamically. C. manage session-oriented connections between nodes. D. report the route taken by packets across an IP network. QUESTION 182 A node within a local area network (LAN) must have a network interface and a: A. resource to share. B. host address. C. network account. D. table of all network nodes. QUESTION 183 One purpose of a perimeter network is to: A. make resource available to the intranet. B. link campus area networks (CANs). C. link local area networks (LANs). D. make resources available to the Internet. QUESTION 184 Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) A. Leased line B. Ethernet C. Dial-up D. Token ring
48 Ensurepass.com Members Features: 1. Verified Answers researched by industry experts. 2. Q&As are downloadable in PDF and VCE format % success Guarantee and Money Back Guarantee. 4. Free updates for 180 Days. View list of All Exam provided: To purchase Lifetime Full Access Membership click here: Valid Discount Code for 2014: SFOH-FZA0-7Q2S To purchase the HOT Microsoft Exams: Microsoft
Study Guide CompTIA A+ Certification, Domain 2 Networking
Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the
COMPUTER NETWORK TECHNOLOGY (40)
PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Networking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
ASM Educational Center (ASM) Est. 1992
CompTIA Network+ Certification Course Outline Objective 1.1 - The OSI and TCP/IP Models The OSI and TCP/IP Models OSI Layer 7 OSI Layer 6 OSI Layer 5 OSI Layer 4 OSI Layer 3 OSI Layer 2 OSI Layer 1 LAN
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
MIS NETWORK ADMINISTRATOR PROGRAM
Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as: Installation
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
TestOut Network Pro English 4.0.x LESSON PLAN
TestOut Network Pro English 4.0.x LESSON PLAN 2 Table of Contents Introduction Section 0.1: Using the Simulator... 5 Networking Basics Section 1.1: Networking Overview... 6 Section 1.2: Network Topologies...
Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker
Microsoft CompTIA Network+ Rapid Review (Exam N10-005) Craig Zacker Introduction xix Preparing for the exam xxiii Chapter 1 Network Concepts 1 Objective 1.1: Compare the layers of the OSI and TCP/IP models
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Mathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS
CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Course Description A course designed to enable students to understand and work with network media and topologies, protocols and
TCP/IP, Addressing and Services
TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia 1 Topics Covered in this
Chapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
Networked AV Systems Pretest
Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials
Domain 3.0 Networking... 1
Table of Contents Domain 3.0 Networking... 1 DOMAIN 3.0 NETWORKING 1. You are installing a cable modem in a client s home. How should you select where to put the cable modem? A. Placing the modem right
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING
10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING PROJECTS Project 10.1 Project 10.2 Project 10.3 Project 10.4 Project 10.5 Project 10.6 Understanding Key Concepts Understanding Wireless Technologies Setting
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
Test Code: 8148 / Version 1
Blueprint Computer Systems Networking PA Test Code: 8148 / Version 1 Copyright 2013. All Rights Reserved. General Assessment Information Computer Systems Networking PA Blueprint Contents General Assessment
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Post-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network
Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components
CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK
1 Chapter 10 CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK Chapter 10: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 2 OVERVIEW Configure and troubleshoot the TCP/IP protocol Connect to a wireless
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)
PAGE 1 OF 16 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2013 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
#888 Network Fundamentals
Network Fundamentals Level: 10-12 Units of Credit: 0.5 or 1.00 CIP: 11.0440 Core Code: 35-01-00-00-030 Prerequisite: Skills Tests: A+ Computer Repair (Suggested) #888 Network Fundamentals MTA Networking
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
Issue 1 April 2, 2009 Using the VT2442 Web User Interface
Using the VT2442 Web User Interface View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. 1 Table of Contents Introduction to the Web UI... 3 Home Page... 4 Setup... 7 WAN Configuration...
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
Lesson Plans Network+
Lesson Plans Network+ (Exam N10-004) Version 3.0 Table of Contents Course Overview... 3 Section 0.1: Course Introduction... 5 Section 0.2: Using the Simulator... 6 Section 1.1: Networking Overview... 7
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
2006 Network + Domain 2 - Study Guide
2006 Network + Domain 2 - Study Guide (2nd of a 4 part series) CompTIA Network+ - Domain 2 Introduction The second domain of the CompTIA Network+ exam represents 20% of the examination and covers the most
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
Cisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Course Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the
SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0
SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
Steps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP
AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP Mst. Najnin Sultana, Abu Jafar Md. Masud Karim Daffodil International University, Dhaka, Bangladesh E-mail: [email protected]
Lesson Plans Managing a Windows 2003 Network Infrastructure
Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...
Chapter 10 Troubleshooting
Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
GregSowell.com. Mikrotik Basics
Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
ERserver. iseries. Remote Access Services: PPP connections
ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.
Computer System Networking and Telecommunications CIP 11.0901 Task Grid
1 Secondary Task List 100 NETWORK TECHNOLOGIES Explain the function of common networking protocols, including TCP,FTP, UDP, TCP/IP suite, DHCP, TFTP, DNS, HTTP(S), ARP, SIP (VoIP), RTP 101 (VoIP), SSH,
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.
Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
N10-005 CompTIA Network+ Certification Exam Document version: 1.04.11
N10-005 CompTIA Network+ Certification Exam Document version: 1.04.11 Important Note About N10-005 PDF techexams N10-005 PDF is a comprehensive compilation of questions and answers that have been developed
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
Gigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
CHAPTER 6 DESIGNING A NETWORK TOPOLOGY
CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine
Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion
Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,
CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
Connecting to and Setting Up a Network
Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits
Chapter 1 Network Security
Chapter 1 Network Security 1.1 Network Security Router Functions Routers connect networks generally based on network addresses, usually IP network addresses. They create subnets (sub-networks) which isolate
ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004
ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
