Professional Documents
Culture Documents
1) What ls a Link
Alink refers to the connectivity between two devicea. h inchudes the type of cables and protocols wed in
order device to be eble to communicate with the other.
15)) What Is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching and control of networkk congestion.
Routers opcrate under this laycr.
16) How does a network topology affect your decision in setting up a network?
Network topology dictates what media you must use to interconnoct devices. It also servcs As baais on
what materials, connoctor and terninations that is spplicablo for tho sctup.
23) What are proxy servers and how do they protect computer networks?
Proxy servers primarily prevent external users who identifying the IP eddresses of an indernal network
Without knowledgo of the correct IP sddress, even the physical location of tho nctwork carnot be
identified. Proxy servers can make a network vitually invisible to external users.
25) What s the importance of implementing a Fault Tolerance System? Are there
limitstlons?
Afmult tolerance system ensures continuous data svailability. This is done by elininating asingle point of
talure. However,
Gocidental this type of system would not be able to protect dats in some cases, such as in
deletions
26) What does 10Base-T mean?
The 10 refers to the data tranaer rate, in this case is 10Mbps. The word Base relers to base band, as
oPpose to broad band. Tmeans twisted pair, which is the cable usod for that network.
27) What is a private IP address?
Private IP addresses are assigned for use on intranets.cnsures
arc not routablc on odemal public nctworks.
Thesethat
addresses are used for internal networks nd
no canflicts are
sare prcsent arnong intamal
network while at the same time the same range of private IF ddresses are reusable for multiple intrancts
since they do not "see" cach other.
31) What s the purpose of cables belng shielded and having twisted palrs?
The main purpose of this is to prevent crosstalk. Crosstalks are electromagnetic interferences or noise ths
can affcct data being transmitted across cablcs.
32) What is the advantage of address sharing?
By using address translation instead of routing sddress sharing provides an inherent security bernefit.
That's becausc host PCs n the Intermet can only see the public IP sddress of the otermal intarfaco on th
computer that provides Bddress translstion and not the pivste IP sddresses on the intenal network.
33) What are MAC addreses?
MAC, or Medis Access Control, uniquely identifies a device on the network It is also known as physics
Bddress or Ethermet sddress. AMAC address is mBde up of 6-byte parts.
34) What s the equivalent layer or layers of the
referonce nodel? TCP/TP Appication layer in terms of OSI
TheeTCP/P
T Application layer actually has throe cournterparts on the OSI model: the Sessian layer,
Presentation
Layer and Application Layer.
35) How an you
By 1looling st the firstldentify the IP ciass ofa gtven IP
octet of any given IP address, you canaddress?
ist octet begins with e Obit, that address is ClasS A Ifit begins identify whother it's ClassA Bor C. If the
B address. If it begins with 110, then it'sa with bits 10 then that address is s Class
Class C nctwork
36) What is the main
OSPF, or Open Shortest purpose
of OSPF?
Path First,4, isa link-state routing protocol that uses routing tables to deternine the
best possible peth for data cxchange.
37) What are firewalls?
Firewalls serve topprotect an irternal network from otermal attacks, These odemal threats can be hackers
Who want to stcal dats or computer viruses that can wipc out data in m instant.
tirom extemal networks from gaining acccss to the It also provents othcr scrs
private network
38) Describe star topology
Star topology consists of a central hub that connects to nodes. This is ane of the casicst to setup and
maintain.
50) How can you manage a network uslng a router? security and data logging. You
Routers have built in console that lets you configure different settings, likesccess, or whst particular time
can assign restrictions to computers, such ss what resourccs it is allowed
of the day they can browse the internet. You can cven put restrictions on what websites are not viewable
across the entire network
51) What protocol can be applled when you want to transfer les between different
platforms, such between UNDX Systems and Windows servers?
Use FIP (File Transfer Protocol) for file transfers between such different servers. This is
possible because FTP is platfom independent.
52) What is the use of a default gateway?
nctwork The
Default gateways provide means for the local nctwork to connect to the external
of the extemal
default gateway for connecting to the extermal network is usually the address
routcr port.
What can be
53) One way of securing a network 0s through the use of passwords.
considered as good passwords?
just letters, but by combining letters and numbers. A
Good passwords are made up of notand
passwordthat lowercase letters is favorable than one that uscs all uppe:
i
combincs updsmust be no words that can casily be gucssed by hacke
caso or all lower case letter8.
better than short oncs.
Such as dates, names, favorites, ctc. Longer passwords are also
UTP cables?
54) What is the proper termination rate for ohms.
The proper termination for unshielded twisted pair nctwork cable is 100
$5) What Is netstat?
Notstat sa command line utility program, It provides uscfal infotmation about tho curent
TCP/IP scttings of a connection.
S) What happens when you use cables longer than the prescribed length?
Cables that are too long would result in signal loss. This moans that data transmisaion and
reception would be affected, because the signal degradca over length.
S8) What common software problems can lead to network folloing:
defects?
the
Softwaro related
client server nbe any or a combination of
application conflicts
error in configuration
protocol mismatch
security issues
user policy and rights issucs
59) What is ICMP?
ICMP is Internot Control Mossago Protocol. It provides mossaging and communication for
protocols within the TCP/TP stack. This is also the protocol that managcs cTor messagcs that are
used by network tools such as PING.
66) What are the marimum networks and hosts in a ctass A, Band C networkt
For Cla A, there are 126 possible networks and 16,777,214 hosts
For Clas B, there are 16,384 posibie networks and 65,534 hosts
For Class C, there are 2,097,152 possible networks and 254 hosts
67) What ls the standard color sequence of a stralght-through cable?
orange/white, orange, groon/whito, blue, bluewhile, grecn, brownwhits, brown.
69) What protocoks fall under the Appllcatlon layer of the TCP/P stack?
The following are the protocols under TCP/P Application Layer: FTP, TFTP, Telaet and SMTP.
69) You need to connect two computers for nle sharing, Is it possi ble to do this wthout
sing a hub or router?
Yca you can connect two computers together using only onc cable. Acrosaover type cable can
of onc cable is conocted to the data
be usc in this scenario. In this sctup, the data transmit pin
rocoive pin of the other cablo, and vico versa.
you move the NIC cards from one PC to another PC, does the MAC address gets
7) When
transferred as well?
Yes, that's because MAC
moans that a PC can haveaaddresses
are hard-wined into the NIC circuitry, not the PC. Ths also
different MAC addrese wben the NIC card was replace by another
One.
87)
n thoWhat
evontis that
oneono
advantage
link fail,ofthere
meshwill
topology?
always bo another vailable. Mosh topology is actually
one of the most fault-tolerant network topology.
88) When troubleshooting computer network problems, what common hardware-related
problems can occur?
Alarge percentage of a network is made up of hardware. Problems in these arcas can range from
malfunctioninehd
hard drives, broken NICs and even hardware startups. Incorectly hardware
configuration is also one of oso culprits to look into,
90) How does dynamlc bost conflguratlon protocol ald in network adminstration?
Instoad of having to visit each client computer to configuro astatic IP addros, the network
administrator can apply dynamic host configuration protocol to create a pool of P addresscs
known as scopes that can be dynamically 2ssigned to clients.
91) Explain proflle in terms of networking concept?
Profiles aro the configuration settings made for cach user. A profile may be created that puts a
User in a group, for examplk.
92) What s sneakernet?
Spcakernet is believed to be the carlicst form of notworking wherein data is physically
transportcd using removable mcia, such as disk, tapes.
93) What is the role of EEE in
IEEE, or the Institute of Electricalcomputer networking?
and Electronics organization composed of
enginces that issDes and man: agcs standards for e l n , 1 an
and electronic devices. This inchudcs
nctworking devices, network interfaces, cablings and connectors.
94) What protocols fall under the TCP/P Internet
Layer?
Lhere are 4 protocols that are being managed by this layer. Those are ICMP, IGMP, P and ARP.
95) When it comes to networking, what are rights?
Rghts refer to the authorizod pemission to perform spocific actions on the network Each uscr
on the nctwork can be:e assigncd individual rights, depending on what must be allowed for that
uscr.