1. In the Command Prompt, what is the command to show the most detailed printout of IP address info?
2. Given the IP address 82.77.201.1/24, what is the network number?
3. What is the normal reach of a signal from a wireless router?
4. When using the PING utility, what are you trying to accomplish?
5. The name of unit exchanged at network layer is called:
6. Which IP address is reserved for loopback testing and debugging?
7. Open System Interconnection (OSI) Model has following layers:
8. Which is the best example of a secure password?
9. Port number of HTTP is:
10. How many layers are there in the OSI model?
11. What is NIC?
12. Can computers with different operating systems communicate over a network?
13. Is it possible to connect two computers without using any hubs or routers for network communication?
14. Which of the following is an Ethernet connector type?
15. What type of network is commonly used in houses?
16. Which of the following is NOT a protocol?
17. What is bandwidth?
18. Which of the following is a connection oriented protocol?
19. Which of the following is not a network topology?
20. A firewall in a Computer Network is a
21. TCP is a ___ protocol.
22. What is a MAC address?
23. Which command will display the assigned IP address of a network adpater installed on a Windows XP system?
24. Which of the following is NOT an example of a client/server?
25. Which protocol is used for email transmission?
26. ADSL stands for:
27. Is it possible for a computer on local network A to talk to a computer on a local network B?
28. What is a handshake?
29. Which is example of wireless encryption?
30. What technology exists that allows a non-routable IP address to communicate with the global IP Internet Network.
31. What is currently the most common and fastest transmission rate for ethernet cables?
32. When can a wireless device NOT connect to a wireless network?
33. What is the maximum supported distance for an Ethernet cable run?
34. Which one is connectionless protocol?
35. What is the purpose of a static IP?
36. Which of the following is NOT an application layer protocol for email?
37. Which item is an example of a physical network address?
38. Which of the network type covers the country level location:
39. Can a computer also act as a router?
40. Which of the following describes how two communicating parties exchange information?
41. When you connect two network switches or two computers directly what type of Ethernet cable do you need?
42. FTP client contacts FTP server at port:
43. A user loads a web browser and browses to http://www.google.com, what is the highest layer of the OSI model the user is functioning at?
44. What is the purpose of an IP?
45. What is the maximum Ethernet cable length between repeaters (computers or switches)?
46. Is it possible to program at the socket level?
47. How is data transferred over a network?
48. The process in which information packets are forwarded to hops is called:
49. Which of the following major networks contain an incorrect subnet mask?
50. Which device is the central device of star topology?
51. UDP is an unreliable protocol.
52. What is the difference between network address and port number?
53. Which of the given TCP/IP protocols can assign a logical address to a host?
54. What is considered part of a network core?
55. What best describes a client/server model?
56. Print server uses ________ which is a buffer that holds data before it is send to the printer.
57. What is a protocol?
58. IPv6 address space is:
59. The default MTU of a typical Ethernet is
60. Hub is a ----------- device.
61. Which switching type has the re-route capability:
62. What is the second layer (layer 2) of the OSI model?
63. Which IPv4 address is not valid?
64. ____ protocol is used by Telnet.
65. Technically, what is the difference between HUB and Switch?
66. Which service reduce the response time for client request and satisfy client request without involving origin server.
67. If you wanted to test to see if a TCP port was opened on a server, what command/tool would you use?
68. Which are the default settings for a Windows XP computer network adapter?
69. Which of the following is/are NOT the difference between TCP and UDP?
70. Where is a hub specified in the OSI model?
71. What fields in the header of an IP packet will be decremented by one that is passed through each router?
72. A server that has HTTP services and SMTP services bound to an interface functions with what protocol?
73. What does the term "Map Network Drive" mean?
74. Which of the following IP addresses is a class A Network?
75. Who initiates a connection between a client and server?
76. A network with more than one exit point.
77. IP Addresses are 48 bit addresses and MAC addresses are 32 bit addresses written in hexadecimal format
78. Which network type can have transmission of data in both directions but not simultaneously.
79. Skype is an example of:
80. What is the subnet mask of this network: 192.168.0.0/29
81. Which network topology is based on a hierarchy of nodes?
82. In TCP/IP model, TCP and UDP protocols work on which layer:
83. Which is NOT a wireless network signal?
84. Does P2P require an always on server?
85. For 802.11b wireless, how many frequency channels are available to avoid collisions/interference?
86. A router that responds to an ARP request intended for a remote host is called what?
87. The name of unit exchanged at Data Link Layer is called:
88. Which topology has a single point failure, i.e. One cable broken whole network is off.
89. What does an assigned IP addres 169.254.0.12 indicate?
90. In IPv4 addresses, how many addresses are available?
91. What or who is responsible for top-level country domains such as uk, ca, and jp?
92. What is the maximum speed of a wireless G network?
93. Which topology uses terminators?
94. Which protocol is used to send a destination network unknown message back to originating hosts?
95. Variability of packet delays within the same packet stream is called
96. In what Operating System(s) are sockets file descriptors?
97. Is a DNS required for hosting a website?
98. What is the primary Layer 3 protocol in the TCP/IP suite?
99. You are a Network Administrator for the ACME company; one of your webservers had a hardware issue, so you moved the IP address (192.168.1.99) to another webserver. Users from other networks are reporting that they still are not able to access the website. You are able to access the website locally; What is the best answer that will fix the issue.
100. What is the purpose of the ARP (Address Resolution Protocol)?
101. A subset of machines receive and process the packets, this type of addressing is called:
102. If a maximum MTU was set to 1300 in the Windows Vista operating system, what would be the smallest packet you can send if you utilize the PING command with the Don't Fragment bit option set?
103. What is a stub network?
104. What are the two sub layers of the Data Link layer of the OSI model?
105. Is a socket controlled at the application level in an operating system?
106. TCP contains several features that benefit the protocol, which of the following answers is not a feature?
107. There are two access points (wireless routers) A and B that belong to the same subnet. What happens when a mobile device connected to A leaves A's range and enters B's range?
108. Your ISP has given you a block of addresses: 199.200.199.0/25; how many IP addresses are available for devices on a network.
109. When a host is generating an ARP packet, what is unknown?
110. At layer 4, what port is reserved for TFTP and what protocol is used?
111. In WLAN, the problem of a station not being able to detect a potential competitor because of being distant is the
112. There are 5 class of IPv4 addresses, what are the class D addresses used for?
113. Which of the following documents detail address allocation for private internets?
114. What is the Subnet Mask of this CIDR Block 123.45.67.89/29?
115. Which of the following is a rfc1918 address?
116. Which method of communication is used to support Ethernet type networks?
117. What does RFC1918 provide?
118. What command to view routing table in Windows
119. IPv4 addresses are divided into how many classes?
120. How many layers does a TCP/IP Protocol stack have?
121. What layer of the OSI model does ICMP work on ?
122. The TCP 3-Way handshake contains three messages that are exchange between two hosts before any application data is transmitted, what does a SYN-ACK message indicate?
123. Which layer of the OSI model is responsible for establishing, managing, and terminating communications between two computers?
124. Which of the following protocol belongs to "Exterior Gateway Protocol"?
125. Which wireless standard is designed for a maximum data tranfer rate of 11 Mb?
126. What debugging tool would you use to troubleshoot TCP connections from client to a server that was experiencing slow transfers and intermittent connectivity?
127. Which of the following cable types is most susceptible to cross talk?
128. An IPv4 header contains a Time To Live (TTL) field, what is the purpose of TTL?
129. Which of the following is an example of a Class B network address?
130. Which of the following is not a layer of the three tier hierarchical model?
131. Which is NOT a transport layer protocol?
132. Which protocol does DHCP use at the Transport layer?
133. What is binary 00011000.01001100.00001010 equivalent to in Decimal?
134. You were given a network address of 67.230.100.64/27 from your ISP, what would the broadcast address be?
135. Which multiplexing allows an optical fibre to carry multiple optical signals simultaneously
136. Which of the following high-speed circuits is the fastest?
137. How many collision domains exist on an 8 port hub?
138. 138.19.50.0/27 provides how many subnets (including the all 0 and 1s subnet)?
139. You have a network address of 192.168.56.0 with four subnets. You want to allow for maximum number of Hosts. What is the subnet mask you need to apply?
140. For UDP/IP or TCP/IP socket communication, what four parameters are generally needed?
141. What is packet switching?
142. An IP header contains a "Blank" field that identifies the type of data that is encapsulated in an IP Packet.
143. What is circuit switching?
144. What is the IP protocol number of TCP?
145. Assuming no PPP compression, standard network MTU of 1500, an IP packet that contains a TCP segment with TCP timestamps and is encapsulated in a Ethernet frame with no 802.1q tags, what would the data rate efficiency be?
146. How does a host determine that an IP address is not located on the local network?
147. Which of the following is the decimal and hexadecimal equivalents of the binary number 01101101?
148. What protocol does PPP use to identify the Network layer protocol?
149. How many collision domains exist on a 24 port switch?
150. Which layer provide end-to-end delivery:
151. What is the IEEE standard for Ethernet?
152. If you are able to browse to a website by IP address but not URL, which of these would be the cause?
153. What port number does SSH run on?
154. Which is the difference between a network address and a port number?
155. Which protocol is used by Telnet?
156. Which of the following defines a protocol?
157. Which of the following is the default MTU of a typical Ethernet?
158. At which port does the FTP client contact the FTP server?
159. Which process forwards information packets to hops?
160. Which is the maximum Ethernet cable length between repeaters (computers or switches)?
161. Which of the following is the name of unit exchanged at network layer?
162. Which of the following is an example of a physical network address?
163. Which is the normal reach of a signal from a wireless router?
164. Which type of Ethernet cable is used when connecting two network switches or two computers directly?
165. Which network type covers the country level location?
166. In the Command Prompt, which is the command to show the most detailed printout of IP address info?
167. Which port number does SSH run on?
168. Which of the following describes a TCP protocol?
169. Which of the following is NIC?
170. Which type of network is commonly used in houses?
171. Which of the following defines bandwidth?
172. Which is the port number of HTTP?
173. Which defines a firewall in a Computer Network?
174. Which does ADSL stand for?
175. Which of the following is currently the most common and fastest transmission rate for ethernet cables?
176. Which of the following is the primary Layer 3 protocol in the TCP/IP suite?
177. Which is the name of the unit exchanged at the Data Link Layer?
178. Which entity is responsible for top-level country domains such as uk, ca, and jp?
179. Which term is used to describe variability of packet delays within the same packet stream?
180. Which of the following is the correct term for a WA router that responds to an ARP request intended for a remote host?
181. In TCP/IP model, on which layer does TCP and UDP protocols work?
182. Which type of device is a hub?
183. Which best describes a client/server model?
184. Which describes the purpose of an IP?
185. Which one is a connectionless protocol?
186. Which is a handshake?
187. Which of the following is the maximum supported distance for an Ethernet cable run?
188. Which technology exists that allows a non-routable IP address to communicate with the global IP Internet Network?
189. Which is an example of wireless encryption?
190. ____ and distributed routing are methods for controlling routing information.
191. ____ are encrypted messages that can be mathematically proven to be authentic.
192. ____ are often considered first-level support.
193. ____ are wide area networks that are logically defined over public transmission systems.
194. ____ involves security audit personnel trying to hack into a network.
195. ____ ip addresses are ip addresses that are not assigned to any specific user or organization.
196. ____ is a disadvantage of using a wireless network when compared to a wired network.
197. ____ is an updated, digital version of x.25 that also relies on packet switching.
198. ____ is the most widely implemented virtualization software today
199. ____ provide a web-based client for checking e-mail.
200. ____ refers to the act of breaking into a computer or network.
201. _____ are used to share data between networks around the world.
202. _____ combine data from different item attributes, or characteristics, to build a code.
203. _____ computing is also known as on-demand computing.
204. _____ is a markup language designed to transport and store data on the web.
205. ______ is a set of applications that manages the activities and resources of a computer.
206. ________ can be used to create what appears to be a private secure network over the internet.
207. ________ is a set of function and call programs that allow clients and servers to intercommunicate.
208. ________ use multiple wi-fi access points to create a wide area network.
209. ___________ ensures that the network is operating as efficiently as possible.
210. A ____ facilitates communication and resource sharing between other computers on the network.
211. A ____ is a computer on a network used to store files.
212. A ____ is a repeater with more than one output port.
213. A ____ is not a type of network device.
214. A ____ network uses radio frequencies to transmit data between computers and devices on a network.
215. A ____ network is the only network that offers a dedicated path.
216. A ________ is a collection of computers connected to one another or to a common connection medium.
217. A ________ sends data from one collision domain to another.
218. A ________ topology uses more than one topology when building a network.
219. A ___________ topology is fully redundant and is the most expensive to implement.
220. A communication ______ is a virtual end point for data entering and leaving a digital device.
221. A computer bus consists of data lines, __________, control lines, and power lines.
222. A distributed computing system usually includes ____.
223. A network ____ usually contains a computer, networked peripheral, or network device.
224. A voip system supports voice and ____ services.
225. An it infrastructure includes ________.
226. An organization that uses cloud services ________.
227. Benefits of using the cloud include all of the following except ________.
228. Cellular services use _____ to provide wireless connectivity to the internet.
229. Cloud resources are ________ because many different organizations use the same physical hardware.
230. Cloud resources are described as pooled because ________.
231. Combining voice, video, and data communications into one interface is known as ____ communications.
232. Computer criminals use denial-of-service attacks on information systems to __________.
233. Connecting two wide area networks requires devices such as high-speed ____.
234. Data are sent through a network in bundles called ________.
235. Data is broken into _____ to be transmitted over the internet.
236. Data is physically transmitted from one computer or terminal to another in the ________ layer.
237. Each computer or device on a network is called a(n) ______.
238. Each vm is known as a ____
239. Electrical data suitable for transmission is called a(n) _______.
240. Every computer on the internet has a unique numeric address called a(n) _______.
241. High speed ________ communication lines use fiber optics
242. If an organization opts for software as a service (saas), it will have to ________.
243. In _____ data transmission, multiple pieces of data are sent simultaneously.
244. In _____ processing, each department has its own computer for performing processing tasks.
245. In ____, each datagram can follow one of many paths to reach its destination.
246. In a ___________ architecture, computers are both client and server, thus sharing the work.
247. In a(n) ____ cluster, every server in the cluster performs useful work.
248. In a(n) ____ relationship, multiple users are provided with access to a server at the same time.
249. In csma/ca, the amount of time a device is made to wait before it can transmit is called the ____.
250. In the context of networking, on-demand computing is also known as ____.
251. In the sliding windows mechanism for flow control, the ____ before waiting for an acknowledgment
252. Ipv6 was needed when ipv4 ________
253. Many certificates conform to the ____ standard.
254. Many it ____ offer specialized services that help companies select software packages.
255. Microsoft’s ____ is one of the major web-based development environments.
256. Most wireless networks transport data as ____ signals.
257. Multiple companies may take advantage of the ____ cloud to pool their cloud resources.
258. Network architectures are classified according to ________
259. Normal telephone cable is a type of ________.
260. On a client/server system, most of the powerful processing is handled by the ________.
261. On most modern wans, a ring topology relies on ____ rings to carry data.
262. Secure wi-fi networks and vpns use _____ to secure data transferred over a network.
263. The protocols pop3 and __________ can be used to manage your incoming mail.
264. The problem of using ip numbers for addressing hosts in the internet are resolved using __________.
265. The process of naming program variables and assigning a type to them is called ____ variables.
266. The purpose of the ________ protocol is to ensure the integrity of the communication.
267. To transfer data packets between two or more networks, a ________ is used.
268. With ____ transmission, data is sent one bit at a time.
269. The technique used for data sent over the internet is ____.
270. To connect devices within your workspace, use a ______.
271. Using a ______________, packets are delivered to a single node on a network
272. Web-based application software is software that ________.
273. The fastest version of wireless ethernet is ________.
274. The function of _____ is to convert digital signals to analog signals and vice-versa.
275. The individual geographic locations connected by a wan are known as ____.
276. The way people view and understand an object or subject depends primarily on ___________.
277. The web server software accepts ____ requests from web browsers connected to the internet.
278. The web, messaging, and ____ communications are three of the more widely used internet services.
279. The world-wide-web uses _____ protocol for transmitting content.
280. To connect to a lan, a computer requires ____.
281. To prevent eavesdropping, applications should ________.
282. Two of the most common types of communications hardware are ____ and network adapters.
283. When setting up a home network, make sure each node has ________.
284. Wireless internet is available using ________
285. Wireless network devices use ________ to communicate with each other
286. The sonet network topology is a ____.
287. The telephone system is an example of a ________ network.
288. The three basic types of subnetworks are ____, packet-switched, and broadcast.
289. The cloud is defined with all the following terms, except ________.
290. Switches can create ____ by grouping a number of ports into a broadcast domain.
291. The ____ is a large, distributed database of internet addresses and domain names.
292. The ____________ command shows current sessions with associated port numbers.
293. The ____________ protocol enables client application programs to access the other layers.
294. Step d in the accompanying figure is known as the ____ step.
295. The process of deciding which path the data takes on a network is called _____.
296. A(n) _____ is a device that connects a user to the internet.
297. A(n) __________ circuit is another name for a multipoint configuration.
298. __________ are high speed central networks to which multiple smaller networks connect
299. A communications ____ determines how devices on a network communicate
300. A firm that offers outsourcing solutions is called a ____ provider
301. A firm that offers outsourcing solutions is called a _____.
302. A ____ measures the time a package takes to process a certain number of transactions
303. A _____ sends messages through several connected lans or to a wide-area network.
304. A ________ detects the speed that a given device can handle and communicates with it at that speed.
305. An organization that hires cloud services ________.
306. ________ is a very well known free voip provider
307. _____ radio frequency identification (rfid) tags have no internal power supply.
308. ____ describes a popular serial data transmission method.
309. _____ is a satellite-based tracking system that enables users to determine a person’s position.
310. The main reason for offshore outsourcing is to _____.
311. ____ is an example of a circuit-switched network.
312. A wi-fi ______ is a wireless local area network that provides internet access to the public.
313. A wireless ________ extender is a wireless network device that repeats your wireless signal.
314. The exclusive use of 0s and 1s as a way to communicate with the computer is known as ____ language.
315. A(n) ____ network uses a central cable to which all network devices connect.
316. The ____ layer is the interface between network software and hardware.
317. The current version of wireless ethernet is ________.
318. ____ is the process of reconstructing segmented data
319. __________ encompasses intrusion detection, prevention and response.
320. ______________ provides a nonexclusive it infrastructure over the internet.
321. A ____ can interpret physical addressing information
322. ________ is used to allow remote login on another computer.
323. A hierarchical topology is also called a ____ topology.
324. The primary design of a(n) _____ is to capture the transmissions from legitimate users.
325. 1000base-sx has a maximum throughput of ____.
326. 802.11 is a series of standards to identify ______ networks.
327. A ____ can be used to intercept a telephone conversation.
328. In the osi (open system interconnection) model, the application layer ____.
329. In the osi (open system interconnection) model, the presentation layer ____.
330. In the osi (open system interconnection) model, the session layer ____.
331. Network technologies that use _______________ light use single-mode fiber optic cabling.
332. The application layer separates data into ____, or discrete amounts of data.
333. The ________ is a core internet protocol that guarantees the reliable delivery of packets.
334. A 32-bit-word computer can access _______.
335. The ____________ protocol places packets on, and receives them from, the network medium.
336. A typical tcp segment has a _______ header of control information.
337. Ipv4 uses ________ bytes per internet address.
338. One task of the ____ layer in a lan is to handle error detection using a crc.
339. The internet protocol suite consists of the internet protocol and _____.
340. The network architecture that spans the largest physical distance is called a ________.
341. A ________ network can contain servers as well as individual computers.
342. Amazon redshift offers ________.
343. Hardware diagnosis and failure alert are handled by ____
344. _____ involves updating one or more databases with new transactions.
345. Organizations can dynamically reuse servers that use web services internally by ________.
346. A ____ connects devices on a network so all the devices can access network components.
347. ____ is commonly used to enable web browsers to communicate with web servers.
348. The concept of two keys, public and private, is called ____ cryptography.
349. You use ________ to predict when a computer hardware system becomes saturated.
350. A(n) ________ is an information system (is) that provides computer-based activity at a distance.
351. The most popular wireless lan technology is ____
352. A(n) ________ is a computer that connects to or requests services from a server.
353. The standard method of specifying the format of web pages is called ________.
354. Using a vpc, an organization can store its ________.
355. When voip relies on the internet, it is often called ____.
356. Each _____ contains data about people, places, things, or events.
357. A wireless ____ connects a wireless network to a wired network.
358. An mis infrastructure is ________and ________.
359. A ____ occurs when two transmissions interfere with each other
360. Many network problems can be traced to poor cable ____ techniques.
361. You can create web pages using a(n) ____, such as adobe dreamweaver or amaya.
362. A ____ is a web-based resource that helps you find specific information on the web.
363. A ______ has a similar role to a hub.
364. A ____________________ is the name of a computer and can be used in place of its ip address.
365. A mainframe computer that controls a large network is called the ________ computer.
366. A wired network is one that uses ____ to connect network devices.
367. A(n) ____ is a computer used to host programs and data for a network.
368. A(n) _____ identifies a web page and is the address of a document or site on the internet.
369. Application layer data lives in the _____ section of the transport layer protocol
370. Dependability is a characteristic of ____
371. Dsl uses ____ to transmit data.
372. ____ defines how information travels across the internet.
373. ____ is a popular cable type used as a network backbone by major telecommunications companies.
374. ____ is an example of a web crawler.
375. Examples of ____ include what, where, is, the, of, in, and how.
376. A _____ links computer resources using either a wired or wireless connection.
377. _______is a nonprofit organization that is responsible for creating top-level domain names.
378. All of the following are tasks for network administration of a large organization except ________.
379. Developing effective apps is considered a critical element to the successful adoption of ________.
380. Http is an example of a(n) ______ layer protocol.
381. In _____, each department has its own computer for performing and controlling processing tasks.
382. The ____ is the parent organization for all the various internet boards and task forces.
383. The fact that signal strength falls off with distance is called ________________.
384. The most common way to access the internet is through _______.
385. A _____ defines what must take place, not how it will be accomplished.
386. A(n) ________ network is often the type of network that is set up in a home or very small business.
387. In a web-based design, the internet serves as the _____ for the database management system.
388. The _________ language, which was used in the first web page ever created, is still in use today.
389. To access a newsgroup, a(n) ________ program is needed.
390. You need your own domain name if ____.
391. Your computer needs a(n) _____ to access a network.
392. With ____, data is sent one bit at a time, one after the other along a single path.
393. With ____, you can send electrical power over the ethernet connection.
394. Installing proper shielding on cables prevents ____.
395. Internet networks are _____.
396. Local area networks (lans) are used to _____.
397. The connection to a peripheral is often called the ____.
398. The most common type of internet search is the ____.
399. High-speed ________ communication lines on the internet backbone use fiber optics.
400. Email is the transmission of messages and files between computers or smart devices over a(n) ____.
401. ________ software helps you manage e-mail, contacts, calendars, and tasks in the same application.
402. A _________ is the place at which the isp provides services to its customers.
403. A(n) ________ device facilitates file sharing and data backup.
404. At the top of the internet structure are tier 1 ___________, such as at&t and sprint.
405. An ip address in the form 197.169.100.1 is called a(n) ________.
406. Before data is transmitted on a network, it is first broken up into ____________________.
407. Bluetooth, 3g, and wimax are examples of _____.
408. In a client-server network, _________ gets software from different vendors to work together.
409. On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
410. Quickbooks is an example of ________ software.
411. Ring networks use the ________ method to avoid data collisions.
412. The _____ cable is a better-constructed version of the phone twisted-pair cable.
413. A virtual private network may include ________.
414. The older version of ip has a ________ header of control information.
415. Arpanet, a new network of computers funded by arpa, was based on a plan developed by ____.
416. The ip addresses 169.254.0.1 and 169.254.255.254 are both examples of ___________________.
417. The result from anding 11001111 with 10010001 is ____.
418. In ipv6, each extension header is identified by a specific ____ value.
419. ____ is/are frequently added to buttons, logos, banners, and other web page graphics.