Beruflich Dokumente
Kultur Dokumente
Multiple Choice
1. You have a key network administrator leave a company. Therefore, what
does the company
depend on to continue to use the network?
a) the user’s password
b) Active Directory
c) master network switch
d) network documentation
Answer: d
Difficulty: Easy
Section Reference: Defining a LAN
Explanation: To understand your LAN better, it helps to write down what
its structure is—in
other words, to document it. Network documentation is any information
that helps describe,
define, and otherwise explain how the network computers are connected
physically and logically.
2. What is the most common central device used today to connect
computers to a network?
a) hub
b) switch
c) SOHO router
d) VPN router
Answer: b
Difficulty: Easy
Section Reference: Defining a LAN
Explanation: Hubs are considered legacy devices and have been replaced
by switches. Switches
allow multiple computers to connect together. The advantage of a switch
over a hub is that it can
handle several conversations at the same time.
3. What is the most common adapter or connector used to connect a
computer to a wired
network?
a) RG6
b) RG58
c) RJ45
d) RJ8
Answer: c
Difficulty: Easy
Section Reference: Defining a LAN
Explanation: RJ-45, which is associated with Ethernet networks, is the
most common wired
adapter by default and is found on virtually every computer these days.
4. Which of the following does a switch use for increased performance?
a) simplex
b) half duplex
c) full duplex
d) sliding duplex
Answer: c
Difficulty: Hard
Section Reference: Defining a LAN
Explanation: A switch switches very fast between multiple connections,
which allow multiple
computers to communicate at the same time. As a result, each client can
send and receive at the
same time (full duplex), which gives better performance.
5. What do you use to isolate a group of computers within your
organization?
a) WLAN
b) WAN
c) VLAN
d) Internet
Answer: c
Difficulty: Medium
Section Reference: Identifying Types of LANs
Explanation: A virtual LAN (VLAN) is a group of hosts with a common set
of requirements that
communicate as though they were connected together as normal on one
switch, regardless of
their physical location. A VLAN is implemented to segment a network,
reduce collisions,
organize the network, boost performance, and increase security.
6. What do you use to create VLANs
a) router
b) switch
c) firewall
d) proxy server
Answer: b
Difficulty: Medium
Section Reference: Identifying Types of LANs
Explanation: Switches usually control the VLAN. Like subnetting, a VLAN
compartmentalizes a
network and can isolate traffic.
7. What zone is used to publish external websites for an organization?
a) intranet
b) exanet
c) internetwork
d) DMZ
Answer: d
Difficulty: Easy
Section Reference: Getting to Know Perimeter Networks
Explanation: A perimeter network (also known as a demilitarized zone or
DMZ) is a small
network that is set up separately from a company’s private LAN and the
Internet. It is called a
perimeter network because it is usually on the edge of the LAN,
8. Which topology is the most redundant and the most expensive?
a) star
b) ring
c) mesh
d) bus
Answer: c
Difficulty: Medium
Section Reference: Identifying Network Topologies
Explanation: A network topology defines the physical connections of hosts
in a computer
network. With the mesh topology, every computer connects to every other
computer. No central
connecting device is needed. Since every computer connects to every
other computer, it requires
the most cabling, which increases the cost.
9. What standard describes CSMA/CD?
a) 801.2
b) 802.3
c) 802.5
d) 802.11
Answer: b
Difficulty: Hard
Section Reference: Defining Ethernet Standards
Explanation: IEEE 802.3 defines carrier sense multiple access with collision
detection
(CSMA/CD). Because computers on a default Ethernet LAN all share the
same channel,
CSMA/CD governs the way computers coexist with limited collisions.
10. What mechanism do wireless networks use to access the network?
a) CSMA/CD
b) CSMA/CA
c) token passing
d) polling
Answer: b
Difficulty: Medium
Section Reference: Defining Ethernet Standards
Explanation: If an organization uses wireless Ethernet, carrier sense
multiple access with
collision avoidance (CSMA/CA) is used.
11. What model promises the most processing power?
a) centralized computing
b) distributive computing
c) switching computing
d) dumb computing
Answer: b
Difficulty: Medium
Section Reference: Identifying the Differences between Client/Server and
Peer-to-Peer
Distributed Networks
Explanation: During the days of the mainframe, all devices that connected
to the one super
computer were known as terminals (or dumb terminals). Today’s
computing is known as
distributive computing and is used for both client/server and peer-to-peer
networks. This means
that every device or workstation has its own processing power.
12. Which model users a central database for authentication?
a) peer-to-peer
b) workgroup
c) client/server
d) distributive
Answer: c
Difficulty: Easy
Section Reference: Defining the Client/Server Model
Explanation: The client/server model is an architecture that distributes
applications between
servers such as Windows Server 2008 and client computers such as
Windows 7 or Windows
Vista machines. It also distributes the necessary processing power. This is
extremely common in
today’s LANs and with most applications an average user would utilize
when connecting to the
Internet.
13. What type of server does Active Director run on?
a) file server
b) print server
c) database server
d) network controller
Answer: d
Difficulty: Easy
Section Reference: Defining the Client/Server Model
Explanation: A controlling server, such as a Microsoft domain controller, is
in charge of user
accounts, computer accounts, network time, and the general well-being of
an entire domain of
computers and users.
14. Which model has each host have their own security database?
a) peer-to-peer
b) client/server
c) distributive
d) sliding
Answer: a
Difficulty: Easy
Section Reference: Defining the Peer-to-Peer Model
Explanation: Peer-to-peer networking means that each computer is
treated as an equal—
meaning, each computer has an equal ability to serve and to access data,
just like any other
computer on the network. Each computer also has its own security
database.
15. What type of communication is sent to a single designated host?
a) unicast
b) broadcast
c) multicast
d) anycast
Answer: a
Difficulty: Medium
Section Reference: Defining Data Transfer on a LAN
Explanation: Unicast describes the situation in which information is sent to
one host only. This
reduces network traffic greatly, and helps with packet loss and duplicates.
16. What is used to uniquely identify a host on a TCP/IP network?
a) IP address
b) MAC address
c) bit pattern
d) router name
Answer: a
Difficulty: Easy
Section Reference: Configuring Internet Protocol
Explanation: An IP address is the cornerstone of networking because it
defines the computer or
host you are working on. Today, every computer and many other devices
have such an address.
An IP address allows each computer to send and receive information in an
orderly and efficient
manner.
Fill in the Blank
17. A _________ is a single computer or device that connects to a TCP/IP
network.
Answer: host
Difficulty: medium
Section Reference: Configuring Internet Protocol
Explanation: IP addresses are usually applied to your network adapter, but
they can also be
applied to other devices like switches, routers, and so on. A device or
computer that has an IP
address is a host.
Short Answer
18. What is the central device used in wireless LANs?
Answer: wireless access point
Difficulty: Easy
Section Reference: Identifying Types of LANs
Explanation: The wireless access point (WAP) acts as the central
connecting device for the
network. Today, such networks can consist of many types of devices other
than traditional PCs,
including smart phones, PDAs, tablet computers, and microcomputers.
19. What is the difference between a switch and a hub?
Answer: A hub allows only one device to communicate to another device
at a time. If two
devices try to communicate at the same time, a collision will result. A
switch allows multiple
conversations to occur at the same time. In addition, a switch also
supports full-duplex, which
means that a computer or host can send and receive at the same time.
Difficulty: Medium
Section Reference: Defining a LAN
Explanation: Because a hub is considered a legacy item, purchasing a new
one today is difficult.
Also, a hub communicates in half duplex, whereas switches support full
duplex.
20. What command do you use to test the TCP/IP stack on a computer?
Answer: ping localhost (or ping 127.0.0.1 or ping loopback)
Section Reference: Defining a LAN
Explanation: You can ping your own computer using the loopback address,
also known as the
local loopback. When pinging this address, no network traffic is incurred;
because the network
adapter is really just looping the ping back to the OS, it never places any
packets on to the
network. Therefore, this is a solid way to test whether TCP/IP is installed
correctly to a network
adapter, even if you aren’t physically connected to a network.
1. When Brian connects a cable from his laptop’s NIC into an RJ45
jack he is connecting to the:
a. VLAN
***b. wired LAN
c. wireless LAN
2. A VLAN is also called a:
***a. logical network
b. internal network
c. external network
3. What will be Erin’s best solution for providing Internet
connectivity
to the pool area?
a. expand the hotel’s wired network
***b. expand the hotel’s wireless network
c. add a new WAN
Essential details
Essential details
• VPNs create a private network and provide a secure tunnel across the
Internet.
• Firewalls can be hardware devices.
• For security zones, keep the security level as high as possible.
• In Microsoft® Internet Explorer® click Tools and then click Internet
Options to set your security settings.
• Mobile phones can be used to connect to a company’s servers.
Essential details
• LANs connect local computers together in a small geographical area.
• Perimeter networks provide an extra layer of security for a company’s
internal network.
• Computers connect to a LAN through a NIC (network interface card).
• The loopback address is a reserved, static address of 127.0.0.1.
• In Microsoft Windows® 7, right-click Network and select Properties to
view your network configuration.
Essential details
• VLANs are created on switches and help improve network performance.
• Wired networks take time to install because wires need to be pulled to
all of the connection jacks.
• Wireless LANs are easy to expand to remote areas.
• Security can be implemented in both wired and wireless LANs.
• In Microsoft Windows 7, click the wireless network icon (on the right side
of the taskbar) to view the available
wireless networks.
1. The best media choice for data to travel long distances without
the risk of interference is:
***a. fiber
b. thin coax
c. unshielded twisted-pair
2. Fiber:
a. can only be used for short distances
b. is extremely inexpensive
***c. transmits data in the form of light
3. Any type of undesirable electromagnetic emission or
electrical/electronic
disturbance is known as:
a. EIGRP
***b. EMI
c. STP
1. Based on the media goals, the type of cable that should be run
to the classrooms is:
a. coaxial
b. fiber
***c. UTP
2. Based on the media goals, the type of cable that should be
used for the backbone is:
***a. fiber
b. STP
c. wireless
3. Jon asks Mary Kay what media she would recommend for the
common areas.
She replies:
***a. “Wireless, because of ease of installation and flexibility.”
b. “Fiber, because of its low cost.”
c. “Wireless because it is secure by default without any configuration
A.DHCPB . W I N S C . N A T D . D N S
Correct Answer:
C
Section: (none)ExplanationExplanation/Reference:QUESTION 79
The query protocol used to locate resources on a network is: A.user Datagram
Protocol (UDP).B.Lightweight Directory Access Protocol
(LDAP),C . T r a c e r t D . T e l n e t .
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 80
Tracert is used to: A.manage routing tables dynamically.B.manage
session-oriented connections between nodes.C.report the route taken by
packets across an IP network.D.report the shortest route between different
networks.
Correct Answer:
C
Section: (none)ExplanationExplanation/Reference:QUESTION 81
In which OSI layer does routing occur? A.TransportB . N e t w o r k C . D a t a
LinkD.Physical
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 82
What type of record does DNS use to find a mail service? A.Service (SRV)
DNS recordB.Canonical (CNAME) DNS recordC.Mail Exchanger (MX)
DNS recordD . H o s t ( A ) D N S re c o rd
Correct Answer:
C
Section: (none)ExplanationExplanation/Reference:QUESTION 83
The default gateway address identifies the: A.device that will connect the
computer to the local network.B.device that will connect the
computer to a remote network. C.server that will provide name
services for the computer.D.server that will authenticate the user of the
computer.
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 84
How many bits are there in an Internet Protocol version 6 (IPv6)
address? A.32B . 6 4 C . 1 2 8 D . 2 5 6
Correct Answer:
C
Section: (none)ExplanationExplanation/Reference:QUESTION 85
Which of the following is a public IP
address? A.10.156.89.1B . 6 8 . 2 4 . 7 8 . 2 2 1 C . 1 7 2 . 1 6 . 1 5 2 . 4 8 D . 1 9 2 .
168.25.101
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:
QUESTION 86
What is the minimum cabling requirement for a 100BaseTX network? A.Category 3
UTP cableB . C a t e g o r y 5 U T P c a b l e C . C a t e g o r y 6 U T P
c a b l e D . M u l t i m o d e fi b e r c a b l e
Correct Answer:
A
A coworker asks for your help in analyzing the table shown here. What
kind of table is this?
Network
Destination Netmask Gateway Interface
0.0.0.0 0.0.0.0 10.254.254.1 10.254.254.205
10.254.254.0 255.255.255.0 On-link 10.254.254.205
10.254.254.205 255.255.255.255 10.254.254.205
127.0.0.0 255.0.0.0 On-link 127.0.0.1
a. ARP table
b. DNS table
c. Local ARP table
d. Local routing table
Answer: D, Local Routing Table.
The IT director has asked you to ping a computer continuously. Which of
the following
is the best command to use?
a. ping -n
b. ping -t
c. ping -1
d. ping 127.0.0.1
Answer: ping -t
You are troubleshooting a computer that cannot obtain the proper IP
address from a
DHCP server. Of the following commands, which should you try first?
a. ipconfig /release
b. ipconfig /renew
c. ipconfig /displaydns
d. ipconfig /source=dhcp
Answer: A, ipconfig /release
You see the following results in the command prompt. What command did
you just type?
Resolved By Broadcast = 0
Resolved By Name Server = 0
Registered By Broadcast = 9
Registered By Name Server = 0
a. nbtstat -r
b. nbtstat -RR
c. nbtstat -R
d. nbtstat -s
Answer: nbstat -r
Your boss's computer can ping other computers, but it cannot connect to
Web sites.
Examine the following ipconfig results and select the best answer to
explain why this has
occurred.
IPv4 Address . . . . . . . . . . . . . . . . . . . . . . . : 10.254.254.1
Subnet Mask . . . . . . . . . . . . . . . . . . . . . . . : 255.255.255.0
Default Gateway. . . . . . . . . . . . . . . . . . . . . : 10.254.254.255
DNS Servers. . . . . . . . . . . . . . . . . . . . . . . . : 127.0.0.1
a. The subnet mask is incorrect.
b. The IP address is incorrect.
c. The default gateway is incorrect.
d. The DNS server is incorrect.
Answer: C, The default gateway is incorrect.
A user cannot connect to the 192.168.1.0 network. Review the ipconfig
results that follow
and select the best answer to explain why this has occurred.
Windows IP Configuration
Host Name . . . . . . . . . . . . . . . . . . . . . . : Computer1
Primary Dns Suffix . . . . . . . . . . . . . . . . . :
Node Type. . . . . . . . . . . . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . . . . . . . . . . : No
WINS Proxy Enabled . . . . . . . . . . . . . . . . : No
Ethernet adapter LAN:
Connection-specific DNS Suffix.:
Description . . . . . . . . . . . . . . . . . . . . . . : Intel(R)
82566DC-2 Gigabit Network Connection
Physical Address . . . . . . . . . . . . . . . . . . : 00-1C-C0-A1-55-16
DHCP Enabled . . . . . . . . . . . . . . . . . . . . : No
Autoconfiguration Enabled . . . . . . . . . . . : Yes
IPv4 Address . . . . . . . . . . . . . . . . . . . . . : 10.254.254.105(Preferred)
Subnet Mask . . . . . . . . . . . . . . . . . . . . . : 255.255.255.0
Default Gateway. . . . . . . . . . . . . . . . . . . : 10.254.254.1
DNS Servers . . . . . . . . . . . . . . . . . . . . . . : 10.255.254.1
a. The MAC address is incorrect.
b. The DNS server address is incorrect.
c. The default gateway address is incorrect.
d. The IP address is incorrect.
Answer: D, The IP address is incorrect.
You are troubleshooting a network connectivity problem and see the
command results
listed here. What command was typed to acquire these results?
1 15 ms 19 ms 19 ms 10.21.80.1
2 12 ms 22 ms 12 ms 208.59.252.1
3 152 ms 216 ms 149 ms 207.172.15.38
4 14 ms 24 ms 37 ms 207.172.19.222
5 21 ms 16 ms 25 ms 207.172.19.103
6 17 ms 23 ms 30 ms 207.172.9.126
7 15 ms 14 ms 15 ms 72.14.238.232
8 15 ms 35 ms 18 ms 209.85.241.148
9 30 ms 23 ms 44 ms 66.249.91.104
a. ipconfig
b. netstat
c. tracert
d. pathping
Answer: C, tracert
The manager of IT asks you to explain to her what command issued the
following
results:
Reply from 10.254.254.1: bytes=32 time=1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
The command typed was ____________.
Answer: Ping -n 10 10.254.254.1
A coworker cannot finish troubleshooting a computer before the end of the
day. Before
leaving, your coworker tells you the following results took over three
minutes to acquire,
and he asks you not to delete them from his screen:
Tracing route to google.com [66.249.91.104]
over a maximum of 30 hops:
0 Desktop-Lamp1 [10.254.254.205]
1 bdl1.eas-ubr16.atw-eas.pa.cable.rcn.net [10.21.80.1]
2 vl4.aggr1.phdl.pa.rcn.net [208.59.252.1]
3 tge1-1.core3.phdl.pa.rcn.net [207.172.15.38]
4 tge2-4.core1.nyw.ny.rcn.net [207.172.19.222]
5 tge1-1.border1.nyw.ny.rcn.net [207.172.19.103]
6 207.172.9.126
7 72.14.238.232
8 209.85.241.148
9 lga15s02-in-f104.1e100.net [66.249.91.104]
Computing statistics for 225 seconds . . .
Source to Here This Node/Link
Hop RTT Lost/Sent = Pct Lost/Sent = Pct Address
0 Desktop-Lamp1
[10.254.254.205]
0/ 100 = 0% |
1 14ms 0/ 100 = 0% 0/ 100 = 0% bdl1.eas-ubr16.atw-eas.
pa.cable.rc
n.net [10.21.80.1]
0/ 100 = 0% |
2 25ms 0/ 100 = 0% 0/ 100 = 0% vl4.aggr1.phdl.pa.rcn.net
[208.59.
252.1]
0/ 100 = 0% |
3 33ms 0/ 100 = 0% 0/ 100 = 0% tge1-1.core3.phdl.pa.rcn.
net [207.
172.15.38]
0/ 100 = 0% |
4 38ms 0/ 100 = 0% 0/ 100 = 0% tge2-4.core1.nyw.ny.rcn.
net [207.1
72.19.222]
0/ 100 = 0% |
5 32ms 0/ 100 = 0% 0/ 100 = 0% tge1-1.border1.nyw.
ny.rcn.net [207
.172.19.103]
0/ 100 = 0% |
6 21ms 0/ 100 = 0% 0/ 100 = 0% 207.172.9.126
0/ 100 = 0% |
7 23ms 0/ 100 = 0% 0/ 100 = 0% 72.14.238.232
0/ 100 = 0% |
8 22ms 0/ 100 = 0% 0/ 100 = 0%
The command that was typed to produce these results is ____________.
...
You need to add the IP address 192.168.1.1 to the network adapter via the
command
line. It also needs to have a gateway address of 192.168.1.100. The
command you
should type is ____________.
Answer: Netsh interface ip add address name="Local Area Connection"
192.168.1.1 255.255.255.0 192.168.1.100
You are troubleshooting a computer that is making strange connections to
the Internet
on its own. The ____________ command will show you the network sessions
to various
computers on the Internet.
Answer: netstat
Your boss wants you to download some manuals from an FTP site. He
wants you to do so
via the command line. The ____________ command will allow you to
accomplish this goal.
Answer: FTP
A coworker has determined the IP address of a domain name as shown in
the following results:
DNS request timed out.
timeout was 2 seconds.
Server: UnKnown
Address: 10.254.254.1
Non-authoritative answer:
Name: google.com
Address: 66.249.91.104
Your coworker typed the ____________ command to acquire these results.
Answer: Nslookup google.com
You are troubleshooting a server and decide to refresh the NetBIOS
names. You type a
command that yields the following results:
The NetBIOS names registered by this computer have been refreshed.
You typed the ___________ command.
Answer: Nbstat -RR
You are simulating network traffic to a remote host. Examine the following
results of a
TCP/IP command:
Reply from 10.254.254.1: bytes=1500 time=2ms TTL=64
Reply from 10.254.254.1: bytes=1500 time<1ms TTL=64
Reply from 10.254.254.1: bytes=1500 time<1ms TTL=64
Reply from 10.254.254.1: bytes=1500 time<1ms TTL=64
Ping statistics for 10.254.254.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 2ms, Average = 0ms
The exact command that was issued was ____________.
Answer:
You are told by your boss to empty the DNS cache of a computer and
reconnect to the
nearest DNS server. You need to type the ____________ and ____________
commands.
Answer: ipconfig/flushdns
ipconfig/registerdns
You are troubleshooting a client's network. The client is using the following
IP network
scheme:
IP network: 10.254.254.0
Subnet mask: 255.255.255.0
The client cannot access the 10.253.253.0 network. You go to the server
that is also
acting as the router between the two networks and type a command. You
see the
following results:
Network
Destination Netmask Gateway Interface
0.0.0.0 0.0.0.0 10.254.254.1 10.254.254.205
10.254.254.0 255.255.255.0 On-link 10.254.254.205
10.254.254.205 255.255.255.255 10.254.254.205
127.0.0.0 255.0.0.0 On-link 127.0.0.1
You typed the ____________ command. The reason the client cannot access
the
10.253.253.0 network is because ____________.
Answer:
Essential details
• WANs can span completely around the world–from the United States to
Australia!
• A WAN link selection depends upon a company’s goals for speed,
availability, cost, and so on.
• The Plain Old Telephone Service (POTS) is the oldest communications
network.
• For small companies, leased lines are a great WAN solution for
connecting two locations.
• Always protect data by encrypting it prior to transferring it across the
Internet.
Essential details
• E1 and E3 are WAN connections available in Europe versus T1 and T3 for
the United States.
• DSL and Cable broadband Internet access technologies each have a
corresponding modem.
• Dial-up and ISDN have decreased in popularity while DSL and Cable
have become more popular.
• Even more WAN technologies exist, such as Frame Relay and ATM
(Asynchronous Transfer Mode).
• WAN links need to be optimized for efficient and fast performance.
Essential details
• Each of the wireless networking standards has different characteristics,
such as speed, distance, frequency,
and so on.
• Connect a WAP (wireless access point) to a wired router to provide
connectivity between the wireless devices
and wired network.
• WPA (Wi-Fi Protected Access) and WPA2 is more secure than WEP (Wired
Equivalent Privacy).
• WP-Enterprise and WP2-Enterprise are used in business environments
and work with an
802.1X authentication server.
• The 802.1X authentication method is used in business environments and
requires
a certificate or smart card for network access.
Essential details
• Bus topologies were popular along with coaxial cable.
• Mesh topologies are more expensive because of the redundant wiring.
• In star topologies a switch is usually used as the central device along
with twisted pair cable.
• Ring topologies are used as backbones for large networks with fiber
cable and may contain redundant rings.
• CSMA/CD is similar to a chat room, while CSMA/CA (Collision Avoidance)
is similar
to a classroom.
E ssential details
• Know the layers of the ISO’s (International Standards Organization) OSI
model.
• Hubs and repeaters are Layer 1 devices, switches and NICs are Layer 2,
and routers are Layer 3.
• Switches can create VLANs (Virtual Local Area Networks), which isolate
network broadcast traffic.
• Bandwidth is the throughput or the data transfer rate.
• If you have a fast port but a slow cable, the network will operate at the
slowest speed, which is the cable’s
speed.
E ssential details
• Switches are more than just a connection point for computers in a LAN.
• Choose the right networking device for the specific goal.
• Hardware redundancy provides highly available networks.
• Managed switches provide more options for network support.
• Use VLANs to segment systems from each other, which in turn enhances
security.
E ssential details
• Routing tables are shared between neighboring routers.
• The router always chooses the best path with the lowest cost from
source to destination.
• NAT allows a private address to be translated to a public address for
Internet access.
• Computers, routers, and other IP devices need a unique 32-bit IP
address and a 32-bit IP subnet mask to
communicate in an IP network.
• Computers also need a gateway address, which is the connected
router’s IP address.
E ssential details
• Fiber has a variety of different type of connectors that connect into
switches, routers, and so on.
• Fiber is available in single-mode and multimode.
• Coax is commonly used for TV connections today rather than enterprise
network installations.
• UTP is commonly used today in star and extended star topologies
because it is inexpensive and easy
to install.
• Wireless provides many advantages over traditional cabling choices and
therefore continues to increase
in popularity.
E ssential details
• UTP cables in LANs contain RJ45 connectors.
• Cat 5e and 6 are popular for new UTP installations.
• Because of safety concerns, it is relatively easy to create UTP cables and
a lot more difficult
to create fiber cables.
• Cables need to be organized efficiently and properly labeled.
• Know and follow the maximum distances for cable runs and even for
wireless
deployments.
Essential details
• Know the OSI model’s seven layers and the standards they represent.
• Standards are followed so that computers and devices can speak the
same language in order to
communicate with each other.
• Each layer communicates with the other layers directly above and
below.
• Data is encapsulated or wrapped up at each layer within a different
wrapper.
• Protocols are a set of rules that provide guidelines for computer
communication
Essential details
• The TCP/IP model, or the TCP/IP protocol suit, contains four layers and
protocols at each layer.
• Different encapsulation types exist at the different layers, such as
packets at the Network layer.
• TCP operates at the Transport layer and IP operates at the Network layer.
• All computers and devices participating in a TCP/IP network require an IP
address,
subnet mask, and default gateway.
• There are a few ports that should be remembered including: 53 (DNS),
80 (HTTP), 25 (SMTP), 110 (POP3).
Essential details
• IP addresses contain four octets and each octet contains eight bits.
• Ranges of IP addresses are reserved for private networks.
• A broadcast address is similar to an e-mail distribution list because
information that is sent to a specific
broadcast address will be sent to all devices on that specific subnet.
• Servers use static addresses; clients use dynamic IP addresses.
• DHCP servers provide IP addresses to clients for a set lease time.
Essential details
• IPv4 addresses contain the numbers 0-255 and IPv6 addresses contain
hexadecimal characters.
• Hexadecimal characters include the numbers 0-9 and letters A-F.
• IPv6 is becoming the new standard.
• Windows provides support for both IPv4 and IPv6 through the Dual Stack
Architecture.
• Teredo, ISATAP, and 6to4 are tunneling technologies that provide
transitional and
backward compatibility between IPv6 and IPv4 networks.
Essential details
• IPv4 and IPv6 packets both contain the source and destination IP
addresses that are used by the router to
route the packet.
• IPv6 addresses contain a dedicated subnetting portion.
• Identify the subnet that an IP address belongs to in a network by
performing a bitwise AND operation of the
subnet mask and IP address.
• The loopback address for IPv4 is 127.0.0.1 and for IPv6 is 0:0:0:0:0:0:0:1
or ::1 (compressed
format).
Essential details
• WINS servers resolve NetBIOS names to IP addresses and assist in
reducing NetBIOS traffic on subnets.
• DNS servers resolve domain names to IP addresses.
• DNS servers are part of the Internet’s infrastructure.
• DNS servers are also used in both enterprise and small business
networks.
• Different DNS record types exist on a DNS server.
Essential details
• Clients are generally assigned dynamic address.
• Servers are assigned static address so that they may be easily located
on a network.
• DHCP servers assign dynamic addresses to clients.
• Remote Access Servers, also known as Communication Servers, provide
access
to remote network resources.
• IPsec, created by IETF (Internet Engineering Task Force), secures IP
communications
through secure authentication and encryption.
Essential details
• To check connectivity, first ping your loopback address (127.0.0.1), then
ping your computer’s IP address, then
ping your default gateway, and finally ping the remote host.
• Ping contains different options for IPv4 and IPv6.
• Ipconfig/all displays lots of useful information, including DNS servers.
• Tracert traces the route a packet takes from the source to destination.
• Telnet logs into a router or computer.