Jawaban Network Fundamental Cybrary

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 3

NETWORK FUNDAMENTAL

SCORE: 85

In relation to IP addressing, what indicates the portion of the address that is


network id and the portion that is host id?
Subnet mask

What type of network can span a large geographical area?


WAN

What is the type of cable most commonly in used in local networks today?
Unshielded Twisted Pair

The model that breaks the processes of network communication into 7 distinct layers
is referred to as the ___________
OSI Reference Model

The address which is used to help packets reach their destination from anywhere in
the world is called _____________
IP address

A basic utility that is used to troubleshoot IP connectivity is called


_____________
PING

In order to connect to an IP network what must be configured?


IP address and Subnet mask

What is the type of network limited to a building or campus?


LAN

The set of rules governing communications between hosts is called a ___________


Protocol

The open protocol that is in use on most networks, including the internet is called
________
TCP/IP

Which RAID offers no fault tolerance


RAID 0

A user can ping a host by IP address, but not by name. What is likely the problem?
DNS

Vendor software releases designed to correct flaws and close security gaps are
called _________
Patches

In a windows environment, authentication servers are referred to as _____


Domain Controllers ??????????

What is the network authentication protocol that is ticket based and provides
mutual authentication?
Kerberos ?????????

What happens when multiple systems try and transmit at the same time on an Ethernet
network?
Collision
A common means of connecting one site to another for the purpose of access and
information sharing is known as
A VPN ??????????

The minimum length for a password on a medium security network should be is


__________characters
Eight??????????????

Which of the following is a protocol that might be used in a VPN?


IPSec

A means of providing redundancy for hard drives is called


RAID

In order to obtain an IP address automatically, what service should be used?


DHCP

When a client reaches their default gateway, which hardware device are they
accessing?
Router

What is a device that separates traffic into zones of trusted vs. untrusted?
Firewall

What network devices connects one network to another?


Router

Windows authentication database is called


Active Directory

What is the best way to guarantee redundancy of data?


Backups

In order to limit the disclosure of data on a network, which process is helpful?


Enumeration ????????

What is the protocol which PING uses?


ICMP

Collision domain isolation is performed by which device?


Switch

What service does a VLAN Provide?


Collision isolation on a switch

What protocol would be used for clients to access email?


POP 3

An area of the network that is segmented from the LAN that is reserved for systems
to which the public will have access (for instance, web servers) is called
_____________
DMZ

Access of resources on a network is generally controlled through


ACLs

What is the network ID of the following IP address? 192.168.1.1 255.255.255.0


192.168.1.0
In order to determine which users are attempting to access a particular network
resource, what should a network administrator configure?
Performance monitoring ??????

A common problem with network cable is that signal degrades over distance. What is
this called?
Attenuation

What type of addressing do switches use?


MAC addresses

A means of distributing security rules and configuration to multiple systems is


through the use of
Access lists

The means that allows a user to log-in once to the domain and access many resources
is called
Single Sign-on

What protocol is responsible for transmitting mail from one mail server to another?
SMTP

A host has an IP Address of 169.254.1.1. What does this indicate


DHCP server is unavailable

Resolving a user-friendly name to an IP address is performed by which service?


DNS

When is Group Policy applied to a computer


Immediately, as soon as the policy is created

To provide redundancy of servers, which of the following is needed?


RAID

You might also like