NET 102 - Networking Essentials II

Review for Third Test

The following questions are provided to help you study for the third test. Do not expect to see these exact questions on the test.

  1. What is multiplexing?

  2. What kind of signals are sent on most telephone lines that lead to central offices? What are they changed to when they are passed from one central office to another?

  3. What is meant by the last mile of a telephone circuit?

  4. What is the bandwidth of a T1 line, expressed to three decimal places?

  5. What is the common round off of the bandwidth of a T3 line?

  6. What is ISTP cable? How many physical circuits are in it?

  7. What kind of frame holds one byte from each of a T1 lines 24 channels? How many of those frames does the T1 line carry per second?

  8. What kind of service do you have if you lease only a part of a T1 line's capacity?

  9. How many T1 lines is a T3 line equivalent to?

  10. What kind of media is used on a SONET system?

  11. With what media should you associate Frequency Division Multiplexing? Which one goes with Wavelength Division Multiplexing?

  12. What is unique about the frames used on an ATM data system?

  13. What is another name for the PSTN system?

  14. What kind of device uses the DOCSIS protocol?

  15. Which 802 standard is also called WiMAX? What is its theoretical range?

  16. Which is the general standard for WiFi?

  17. What is the difference between ad hoc and infrastructure mode, with regard to wireless networks?

  18. What is an SSID?

  19. Why do wireless standards use CSMA/CA instead of CSMA/CD?

  20. How is Power over Ethernet different from Broadband over Power Lines?

  21. Which 802.11 revision has the shortest rated range? Which has the longest?

  22. WPA2E is preferred over WPA2. Why would you be unlikely to see WPA2E used in a home network?

  23. What does the phrase open circuit mean with regard to network cable? How is the condition repaired?

  24. What is the repair needed if you find an impedance mismatch in the network?

  25. What is the difference between a 110 blade and a 66 blade on a punchdown tool?

  26. What is a well known brand name of a tone probe and tone generator? Why might you want such a thing?

  27. What is the difference between tracert and traceroute?

  28. When do you use ipconfig and ifconfig?

  29. What will netstat do if you enter an IP address as an argument?

  30. What is the difference between a protocol analyzer and a packet analyzer?

  31. You should know the general troubleshooting plan discussed in the text. What is the first step? What do you do after you form a theory about the cause of the problem? What step comes before testing your solution? When might you need to escalate the trouble ticket?

  32. Why does a system need to have fault tolerance? What does it mean to have it?

  33. If a virus was triggered by a user opening an actual spreadsheet from an email, what kind of virus is probably involved?

  34. What does a rootkit virus do that may make it hard to notice?

  35. What is involved in a phishing attack? When is a phishing attack an example of social engineering?

  36. What is a man in the middle attack?

  37. What kind of attack is a smurf attack?

  38. What kind of crime is leeching?

  39. What is an evil twin? What kind of attack does the text say might use an evil twin?

  40. What is the test for whether you are using multifactor authentication?

  41. What is a feature of using Active Directory to assign rights that makes it less prone to error than assigning rights to each user?

  42. What kinds of addresses can a firewall be told to filter on?

  43. Why should you and your firewall care about the state of the port traffic is bound for?

  44. In which network zone do we typically put our public facing web servers?

  45. What kind of network tool is Nmap?

  46. How might running virtual servers reduce our power cost?

  47. If a virtual machine crashes, what is involved in replacing it?

  48. Which management software does the text recommend if we are running virtual servers? What software might we use to run virtual machines?

  49. What are some of the network characteristics that we might track when recording our baseline?

  50. What do we need to tell our staff when we write an acceptable use policy?

  51. What sort of things do we document in security policies?

  52. What is the purpose of Windows Performance Monitor?

  53. How does caching improve the performance of network streaming? How does it affect requests for web content? What is the drawback to caching, with regard to web content?

  54. What kind of a backup resets all archive bits of the target?

  55. What kind of backups do not reset any archive bits of the target?

  56. What is another name for RAID 0? What is its effect on fault tolerance?

  57. What is the difference between mirroring and duplexing drives?

  58. What is the difference between RAID 5 and RAID 6?