Notes
Notes
We hear about data all of the time. Customer data, personal data,
health data, census data, but what exactly is data? Perhaps the
simplest definition of data is that data is a value that represents
something. In the physical world, we represent data as numbers,
formulas, alphabetic characters, and pictures. Think about all of the
data that exists just about you. Some examples include birth records,
baby pictures, school records, and health records.
Most people use networks to transmit their data in order to share with
others, or for long-term storage. Every time you hit “send” or “share” in
an app or computer application, you are telling your device to send
your data to a destination somewhere on the network. Sometimes,
data is being sent by your devices and you may not even be aware
that this is happening. Examples of this are when you set up an
automatic backup utility, or when your device automatically searches
for the router in a Wi-Fi hotspot.
1.3.1 Bandwidth
The table shows the commonly used units of measure for bandwidth.
1.3.3 Throughput
The amount of data being sent and received over the connection
The types of data being transmitted
The latency created by the number of network devices
encountered between source and destination
There are many online speed tests that can reveal the throughput of
an internet connection.
Notes
Easy to set up
Less complex
Lower cost because network devices and dedicated servers may
not be required
Can be used for simple tasks such as transferring files and
sharing printers
No centralized administration
Not as secure
All devices may act as both clients and servers which can slow
their performance
A single computer can also run multiple types of client software. There
must be client software for every service required. With multiple clients
installed, a host can connect to multiple servers at the same time. For
example, a user can check email and view a web page while instant
messaging and listening to internet radio.
Question 1
That’s right.
Servers are hosts that have software installed that enable them to
provide information, like email or web pages, to other hosts on the
network
Question 2
That’s right.
Clients are computer hosts that have software installed that enable
them to request and display the information obtained from the server.
Question 3
That’s right.
The path that a message takes from its source to destination can be
as simple as a single cable connecting one computer to another, or as
complex as a network that literally spans the globe. This network
infrastructure is the platform that supports the network. It provides the
stable and reliable channel over which our communications can occur.
End devices
Intermediate devices
Network media
Devices and media are the physical elements, or hardware, of the
network. Hardware is often the visible components of the network
platform such as a laptop, PC, switch, router, wireless access point, or
the cabling used to connect the devices. Occasionally, some
components may not be so visible. In the case of wireless media,
messages are transmitted through the air using invisible radio
frequencies or infrared waves.
The network devices that people are most familiar with are called end
devices, or hosts. These devices form the interface between users
and the underlying communication network.
Some examples of end devices are as follows:
summary
Servers are hosts that have software installed that enable them to
provide information, like email or web pages, to other hosts on the
network. Clients are computer hosts that have software installed that
enable them to request and display the information obtained from the
server. In small businesses and homes, many computers function as
the servers and clients on the network. This type of network is called a
peer-to-peer (P2P) network. The simplest peer-to-peer network
consists of two directly connected computers using either a wired or
wireless connection. A P2P application allows a device to act as both
a client and a server within the same communication. In this model,
every client is a server and every server is a client. In a home or small
business, it may be necessary for one computer to act as a file server,
a web server, and an email server. A single computer can also run
multiple types of client software. There must be client software for
every service used.
The network infrastructure contains three categories of hardware
components: intermediate devices, end devices, and network
media. Devices and media are the physical elements, or hardware, of
the network. Hardware is often the visible components of the network
platform such as a laptop, PC, switch, router, wireless access point, or
the cabling used to connect the devices. The network devices that
people are most familiar with are called end devices, or hosts. These
devices form the interface between users and the underlying
communication network. An end device (or host) is either the source
or destination of a message transmitted over the network.
The design of the first cell phone radio transmitters did not allow
for the efficient transmission of digital data, so enhancements were
made to improve the way that data is sent across cell phone networks.
The abbreviations 3G, 4G, 4G-LTE, and 5G are used to describe
enhanced cell phone networks that are optimized for the fast
transmission of data. The “G” in these designations represents the
word “generation,” so 5G is the fifth generation of the cell network.
Most mobile phones and smart phones have an indicator that shows
when a 4G or 5G signal is available.
Click below to learn more about other networks that are used by
smartphones.
The GPS uses satellites to transmit signals that cover the globe. The
smart phone can receive these signals and calculate the phone’s
location to an accuracy of within 10 meters.
Wi-Fi transmitters and receivers located within the smartphone enable
the phone to connect to local networks and the internet. In order to
receive and send data on a Wi-Fi network, the phone needs to be
within the range of the signal from a wireless network access point.
Wi-Fi networks are usually privately owned but often provide guest or
public access hotspots. A hotspot is an area where Wi-Fi signals are
available. Wi-Fi network connections on the phone are similar to the
network connections on a laptop computer.
That’s right.
Question 2
That’s right.
Hosts
Peripherals
Network devices
Network media
The network components that you are probably most familiar with are
hosts and shared peripherals. Remember that hosts are any devices
that send and receive messages directly across the network.
The term network media describes the cables and wires used in wired
networks, along with radio frequency waves used in wireless
networks. These wired and wireless networks provide the paths over
which messages travel between the various network components.
Some devices can play more than one role, depending on how they
are connected. For example, a printer that is directly connected to a
host (local printer) is a peripheral. A printer that is directly connected
to a network device and participates directly in network
communications is a host.
The use of logical device naming and addressing conventions that are
well documented can greatly simplify the task of training and network
management and can help as well with troubleshooting when
problems arise.
Think about the devices in your home or school that access the
internet. At home, do you have devices that you can control or
manage from your mobile phone or tablet? Draw a physical topology
of the network at your home or in your classroom. Compare your
topology with those created by your classmates.
Question 1
That’s right.
Question 2
That’s right.
Network Documentations
It is important that a network is well planned, logically organized, and
well documented. Device names must be unique and should have a
consistent format that conveys meaningful information. This can help
to determine device type, function, location, and sequence number
based on the device name. IP addresses must also be unique to each
device. When networks are installed, a physical topology diagram is
created to record where each host is located and how it is connected
to the network. The physical topology diagram also shows where the
wiring is installed and the locations of the networking devices that
connect the hosts. There is also other information that you must have
when troubleshooting network problems. This information cannot be
“seen” from the physical view of the network. The device names, IP
addressing, configuration information, and network designations are
logical pieces of information that may change more frequently than the
physical connectivity. A logical topology illustrates the relevant
network configuration information.
Module question
1. What is a characteristic of a SOHO network?
2. What is the delay in the amount of time for data to travel between two points
on a network?
o bandwidth
o throughput
o latency
o goodput
Answers Explanation & Hints:
Latency is a term used to indicate delay when getting a packet from one point to another. Network connections with smal
called low-latency networks, whereas network connections with long delays are called high-latency networks. High laten
any network communications.
3. What type of network is defined by two computers that can both send and
receive requests for resources?
o client/server
o peer-to-peer
o enterprise
o campus
Answers Explanation & Hints:
The simplest form of peer-to-peer networking consists of two computers that are directly connected to each other through
wireless connection.
o 4G
o Wi-Fi
o NFC
o Bluetooth
Answers Explanation & Hints:
3G, 4G, and 4G-LTE are technologies that are used to provide enhanced cell phone networks that are capable of fast data
o NFC
o Wi-Fi
o 3G/4G
o Bluetooth
Answers Explanation & Hints:
Near Field Communications (NFC) is a wireless technology that enables data to be exchanged by devices that are in very
other.
7. A traveling sales representative uses a cell phone to interact with the home
office and customers, track samples, make sales calls, log mileage, and
upload/download data while at a hotel. Which internet connectivity method
would be a preferred method to use on the mobile device due to the low cost?
o cellular
o DSL
o cable
o Wi-Fi
Answers Explanation & Hints:
Mobile devices typically use either the cellular network or a Wi-Fi network to connect to the internet. The Wi-Fi connect
uses less battery power and is free in many places.
o default gateway
o host IP address
o subnet mask
o DNS server
Answers Explanation & Hints:
The types of IP configuration on a host device include these:
IP address – identifies the host on the network.
Subnet mask – identifies the network on which the host is connected.
Default gateway – identifies the networking device that the host uses to access the Internet or another remote network.
DNS server – identifies the server that is used to translate a domain name into an IP address.
9. Refer to the exhibit. A student is working on a Packet Tracer lab that includes
a home wireless router to be used for both wired and wireless devices. The
router and laptop have been placed within the logical workspace. The student
adds a laptop device and wants to replace the wired network card with a
wireless network card. What is the first step the student should do to install
the wireless card?
Modules 1 –
4 Internet Connection Getting Online Pre-Test Exam Answers 02
o Power off the laptop by clicking on the power button.
o Drag the wired network card into the list on the left side.
o Select the Config tab and then the wireless network card checkbox.
o Select the WPC300N option from the left and drag that card to the side of the laptop.
Answers Explanation & Hints:
Any time you are removing or installing devices into a PC or laptop within Packet Tracer, turn the power off. For the Pac
Physical tab and click on the power button to the immediate right of the power cord.
o console
o crossover
o fiber
o straight-through
Answers Explanation & Hints:
A FastEthernet straight-through cable is used to connect the FastEthernet0 port on a PC to a switch port.
11.Refer to the exhibit. Which menu item would be used to bring up a web
browser?
Modules 1 – 4
Internet Connection Getting Online Pre-Test Exam Answers 02
o Physical
o Config
o Desktop
o Programming
o Attributes
Answers Explanation & Hints:
The Desktop menu item is used to access common applications and tools used to configure a device such as the IP addres
browser, as well as other apps.
12.Refer to the exhibit. A user is creating a wired and wireless network using
Packet Tracer. The user has added a home wireless router, a PC, and a laptop.
The user configures the home wireless router. Which icon represents the tool
that can be used on the laptop to view the SSID and connect to the wireless
router?
Modules 1
– 4 Internet Connection Getting Online Pre-Test Exam Answers 03
o Command Prompt
o IP Configuration
o Web Browser
o PC Wireless
Answers Explanation & Hints:
The PC Wireless icon represents the tool that can be used to view and connect to a specific wireless SSID that has been c
router.
o coaxial cable
o fiber-optic cable
o twisted-pair cable
o shielded twisted-pair cable
Answers Explanation & Hints:
Fiber-optic cables can carry very large amounts of data and are used extensively by telephone companies and in backbon
14.A group of newly hired entry-level network engineers are talking about the
network cabling they are going to have to install as a team. What is a
characteristic of Ethernet straight-through UTP cable?
o It can only use the T568A standard at both ends of the cable.
o It can be used to connect two network hosts.
o It is Cisco proprietary.
o It is susceptible to interferences from EMI and RFI.
Answers Explanation & Hints:
Ethernet straight-through UTP cable is commonly used to interconnect a host to a switch and a switch to a router. It can u
T568B) at both ends. EMI and RFI signals can distort and corrupt the data signals being carried by copper media.
15.A network administrator would like to determine the path a packet takes to
reach the destination 192.168.1.1. What is the best command to determine the
network path?
o tracert 192.168.1.1
o ping 127.0.0.1
o ping 192.168.1.1
o ipconfig 192.168.1.1
Answers Explanation & Hints:
The traceroute (tracert) command is used to verify the path to a destination device. The ping command is used to verify L
ipconfig command is used to display the IP address on a device.
4 Videos
4 Packet Tracer activities
1 Module Quiz
With Packet Tracer you can choose to build a network from scratch,
use a pre-built sample network, or complete lab activities. Packet
Tracer allows you to easily explore how data traverses your network.
Packet Tracer provides an easy way to design and build networks of
varying sizes without expensive lab equipment. While this software is
not a replacement for practicing on physical routers, switches,
firewalls, and servers, it provides too many benefits to ignore!
The top row of icons represents the category list consisting of:
[Networking Devices], [End Devices], [Components], [Connections],
[Miscellaneous], and [Multiuser]. Each category contains at least one
sub-category group.
Packet Tracer - Deploy Devices
Objectives
In this activity, you will deploy multiple devices.
Required Resources
Latest version of Packet Tracer
Instructions
A list of device labels is visible in the workspace, we will use various methods to deploy the listed
devices.
Note: If you require more help with Packet Tracer, navigate to Help > Contents within Packet Tracer.
Background / Scenario
You will locate, deploy, and cable multiple types of devices.
Instructions
Part 1: Deploy the Devices
a. Navigate to the Device-Type Selection box at the bottom of the screen.
The top row of icons represents categories of devices and the bottom row represents
subcategories. Point at the top row of icons slowly and look at the Label box between the rows;
the names of the categories will appear. Now point at the lower row icons and you will see their
names appear.
b. You will deploy switches and PCs. Point at the lower row icons until you see one labeled
Switches. Click the switch icon and you will see the switch devices in the Device-Specific
Selection box change.
c. Deploy two 2960 switches over the Switch0 and Switch1 labels in the workspace. You can drag
and drop the switch or select the desired switch and click the desired location in the workspace.
d. Repeat for the end devices. Click the End Devices category in the Device-Type Selection box
and deploy six PCs.
If you are unsure of which device is the PC, just point at the device in the Device-Specific
Selection box and look at the label area below the devices; it should say PC-PT. (Remember
that you do not have to select the PC icon six times to deploy them. There is a shortcut).
Note: If you need more instructions for deploying the devices, you can refer to a previous Packet
Tracer activity or click Help > Contents > select Workspace Basics > Logical
Workspace within Packet Tracer.
Physical
Config
CLI
Desktop
Services
The tabs that are shown depend on the device you are currently
configuring.
Background / Scenario
In this activity, you will construct a simple Packet Tracer network and complete basic configuration of
end devices.
Instructions
f. You can also ping PC1. Navigate to the Command Prompt for PC1 and enter the command ping
192.168.1.3 at the prompt. The ping should be successful.
g. Close the command prompt when finished.
Internet DHCP
cisco.com Server Ethernet0 209.165.200.225 255.255.255.224 N/A
Laptop Wireless0 DHCP 192.168.0.1
Objectives
In this activity, you will build a simple network in Packet Tracer.
Part 1: Build a Simple Network
Part 2: Configure the End Devices and Verify Connectivity
Instructions
To obtain and install your copy of Cisco Packet Tracer, please follow
the instructions from the link below:
https://skillsforall.com/resources/lab-downloads
Packet Tracer provides three main menus that allow you to do the
following:
You can configure the different intermediate and end devices that
make up your network. Click the device that you wish to configure. A
popup window will appear displaying a series of tabs. Different types
of devices have different interfaces.
For intermediate devices such as routers and switches, there are two
methods of configuration available. Devices can be configured or
investigated via a Config tab (a GUI interface) or a command line
interface (CLI). The CLI interface requires knowledge of device
configuration.
For some of the end devices, such as PCs and laptops, Packet Tracer
provides a desktop interface that gives you access to IP configuration,
wireless configuration, a command prompt, a web browser, and much
more.
If you are configuring a server, the server has all of the functions of
the host with the addition of the Services tab. With it, you can
configure a server as a web server, a DHCP server, a DNS server, or
other type of server.
Question 1
Multiple choice question
What is a feature of Packet Tracer?
laptop
PC
switch
That’s right!
Topic 3.5.0 - The exhibit shows the 2.4 GHz and multiple 5 GHz
wireless networks that can be configured on a home wireless network
within Packet Tracer. Each wireless network can be a unique SSID.
Complete Question 3
Question 3
Multiple choice question
Refer to the exhibit. A user is building a home wireless network within
Packet Tracer. The user adds 2 PCs and 2 laptops. Which device
would be needed to create the network?
Config
Desktop
Programming
Attributes
That’s right!
Topic 3.4.0 - The Desktop menu item is used to access common
applications and tools used to configure a device such as the IP
address, command prompt, web browser, as well as other apps.
Complete Question 5
Question 5
Multiple choice question
Which type of cable connection would be used in Packet Tracer to
connect a FastEthernet port on a PC to a switch port?
console
crossover
fiber
straight-through
That’s right!
Topic 3.3.0 - A FastEthernet straight-through cable is used to connect
the FastEthernet0 port on a PC to a switch port.
Complete Question 6
Question 6
Multiple choice question
A student is creating a wired network in Packet Tracer. The student
added six PCs. What other device is needed so that the PCs can
communicate with one another?
cloud
firewall
switch
IoT gateway
That’s right!
Topic 3.3.0 - To create a wired local-area network in Packet Tracer,
host devices such as PCs or laptops can be used in addition to a
switch. Use a straight-through Ethernet cable to connect each end
device to the switch.
Complete Question 7
Question 7
Multiple choice question
Command Prompt
IP Configuration
Web Browser
PC Wireless
That’s right!
Topic 3.4.0 - The PC Wireless icon represents the tool that can be
used to view and connect to a specific wireless SSID that has been
configured on a wireless router.
Complete Question 8
Question 8
Multiple choice question
Drag the wired network card into the list on the left side.
Select the WPC300N option from the left and drag that card to the
side of the laptop.
That’s right!
Topic 3.3.0 - Any time you are removing or installing devices into a PC
or laptop within Packet Tracer, turn the power off. For the Packet
Tracer laptop, use the Physical tab and click on the power button to
the immediate right of the power cord.
Complete Question 9
Question 9
Multiple choice question
The technician should check the Physical tab to ensure that the
wireless router is powered on.
That’s not right.
Topic 3.4.0 - When working with a wireless device within the Packet
Tracer GUI environment, scroll to the bottom and select the Save
Settings option for each menu item.
Complete Question 10
Question 10
Multiple choice question
Refer to the exhibit. Which Packet Tracer menu option would be used
to change the preferences such as showing port labels in the logical
workspace?
File
Edit
Options
Tools
Extensions
That’s right!
Topic 3.4.0 - The Options menu item allows configuration and viewing
of Packet Tracer preferences, user profile information, algorithm
settings, and command log.
5 Videos
2 Labs
4 Check Your Understanding activities
1 Module Quiz
The four main criteria for choosing network media are these:
That’s right.
Criteria for choosing a network media include the maximum
transmission distance, the environment, the amount and speed of data
to be transmitted, and the cost of the media and installation.
Question 2
That’s right.
That’s right.
That’s right.
Ethernet Cabling
The networks in most homes and schools are wired with twisted-pair
copper cable. This type of cable is inexpensive compared to other
types of cabling, and it is readily available. The Ethernet patch cables
that you can purchase through the internet or at a retail store are an
example of copper twisted-pair cable
UTP Cable
UTP cable is inexpensive, offers a high bandwidth, and is easy to
install. This type of cable is used to connect workstations, hosts and
network devices. It can come with many different numbers of pairs
inside the jacket, but the most common number of pairs is four. Each
pair is identified by a specific color code.
STP Cable
There are electrical environments in which EMI and RFI are so strong
that shielding is a requirement to make communication possible, such
as in a factory. In this instance, it may be necessary to use a cable
that contains shielding, such as shielded twisted-pair (STP).
Unfortunately, STP cables are very expensive, not as flexible, and
have additional requirements because of the shielding that make them
difficult to work with.
Many different categories of UTP cables have been developed over
time, as shown in the table. Each category of cable was developed to
support a specific technology and most are no longer encountered in
homes or offices. The cable types which are still commonly found
include Categories 3, 5, 5e, and 6.
All categories of data grade UTP cable are traditionally terminated into
an RJ-45 connector. There are still some applications that require the
smaller RJ-11 connector, such as analog phones and some fax
machines. In the figure below, an example of an RJ-11 connector is
on the left. The RJ-45 connector is on the right.
Crosstalk occurs when cables are bundled together for long lengths.
Question 2
That’s right.
That’s right.
All categories of data grade UTP cable are traditionally terminated into
an RJ-45 connector.
Coaxial and Fiber-Optic Cabling
4.3.1 Cable TV and Satellite Cables
Like twisted-pair, coaxial cable (or coax) carries data in the form of
electrical signals. It provides improved shielding compared to UTP and
can therefore carry more data. Coaxial cable is usually constructed of
either copper or aluminum. It is used by cable television companies to
provide service and for connecting the various components that make
up satellite communication systems. You are probably familiar with the
coaxial cables used to connect a TV set to the signal source, be it a
cable TV outlet, satellite TV, or conventional antenna in your home.
With the addition of a cable modem, the cable television provider can
offer data and internet service, as well as television signals and
telephone over the same coaxial cable.
Unlike UTP and coax, fiber-optic cables transmit data using pulses of
light. Although not normally found in home or small business
environments, fiber-optic cabling is widely used in enterprise
environments and large data centers.
That’s right.
coaxial
UTP
STP
fiber-optic
ResetShow feedback
Previous
Home
Nex
Question 2
That’s right.
Twisted-Pair Operation
4.4.1 Twisted-Pair Wiring Schemes
Have you ever looked closely at the plastic RJ-45 connector at the
end of an Ethernet patch cable? Did you ever wonder why each of the
wires terminating in the connector has a specific color or pattern? The
color coding of the wire pairs in an UTP cable is determined by the
type of standard that is used to make the cable. Different standards
have different purposes and are closely governed by the standards
organizations.
For typical Ethernet installations, there are two standards that are
widely implemented. The TIA/EIA organization defines two different
patterns, or wiring schemes, called T568A and T568B, as shown in
the figure. Each wiring scheme defines the pinout, or order of wire
connections, on the end of the cable.
On a network installation, one of the two wiring schemes (T568A or
T568B) should be chosen and followed. It is important that the same
wiring scheme is used for every termination in that project.
Devices that are directly connected and use the same pins for transmit
and receive, are known as like devices. They require the use of a
crossover cable in order to reverse the transmit function and receive
function so that the devices can exchange data.
Question 1
That’s right.
That’s right.
Devices that are directly connected and use the same pins for transmit
and receive require the use of a crossover cable in order to reverse
the transmit function and receive function so that the devices can
exchange data.
Question 3
That’s right.
Devices that use different wires for transmit and receive require a
straight-through cable to exchange data. Straight-through cables have
the same color patterns on both ends of the cable.
Verify Connectivity
4.5.2 Using the ping Command
Every device that sends messages across the internet must have an
Internet Protocol (IP) address to identify it to the other devices in the
network. IP addresses are assigned by network administrators. When
a new device is added to a network, or if an existing device is having
problems, it may be necessary to test the network to determine if the
IP address assigned to the device can be reached by other devices on
the network.
Ethernet cabling
Like twisted-pair, coaxial cable (or coax) carries data in the form of
electrical signals. It provides improved shielding compared to UTP and
can therefore carry more data. Although coax has improved data
carrying characteristics, twisted-pair cabling has replaced coax in
LANs because coax is harder to install, more expensive, and harder to
troubleshoot.
Unlike UTP and coax, fiber-optic cables transmit data using pulses of
light. Fiber-optic cable is constructed of either glass or plastic, neither
of which conducts electricity. This means that it is immune to EMI and
RFI, and is suitable for installation in environments where interference
is a problem. Fiber connections are a good choice to extend networks
from one building to another, both because of distance considerations
and because fiber cables are more resistant to outdoor environmental
conditions than copper cables. Each fiber-optic circuit is actually two
fiber cables. One is used to transmit data; the other is used to receive
data. Either lasers or light emitting diodes (LEDs) generate the light
pulses that are used to represent the transmitted data as bits on the
media. In addition to its resistance to EMI, fiber-optic cables support a
large amount of bandwidth, making them ideally suited for high-speed
data networks.
The color coding of the wire pairs in an UTP cable are determined by
the type of standard that is used to make the cable. Different
standards have different purposes and are closely governed by the
standards organizations.
Verify Connectivity
The traceroute utility traces the route a message takes from its source
to the destination. Each individual network through which the message
travels is referred to as a hop. The traceroute command displays each
hop along the way and the time it takes for the message to get to that
network and back. The traceroute utility is called tracert in the
Windows environment.
Which type of network cable contains multiple copper wires and uses
extra shielding to prevent interference?
STP
UTP
fiber-optic
coax
That’s right!
Complete Question 2
Question 2
Multiple choice question
unshielded twisted-pair
coaxial
fiber-optic
shielded twisted-pair
That’s right!
Complete Question 3
Question 3
Multiple choice question
crossover
crosstalk
RFI
collision
That’s right!
Topic 4.2.0 - Crosstalk occurs when cables are bundled together for
long lengths and the electrical impulses from one cable cross over to
an adjacent cable
Complete Question 4
Question 4
Multiple choice question
It can only use the T568A standard at both ends of the cable.
It is Cisco proprietary.
Complete Question 5
Question 5
Multiple choice question
STP
coaxial
fiber optic
UTP
That’s right!
Complete Question 6
Question 6
Multiple choice question
fiber-optic cable
twisted-pair cable
Topic 4.1.0 - Fiber-optic cables can carry very large amounts of data
and are used extensively by telephone companies and in backbone
networks.
Complete Question 7
Question 7
Multiple choice question
fiber-optic cable
coaxial cable
Topic 4.4.0 - Devices that use the same pins to transmit and receive
data require the use of a crossover cable in order to successfully
exchange data.
Complete Question 8
Question 8
Multiple choice question
ipconfig
ping
netstat
nslookup
That’s right!
Complete Question 9
Question 9
Multiple choice question
crossover
rollover
straight-through
fiber-optic
That’s right!
Complete Question 10
Question 10
Multiple choice question
That’s right!
Topic 4.5.0 - Packets that are routed across the Internet contain
source and destination IP addresses. These addresses are used to
determine how the packets should be routed from source to
destination by intermediate devices.
Complete Question 11
Question 11
Multiple choice question
A network administrator would like to determine the path a packet
takes to reach the destination 192.168.1.1. What is the best command
to determine the network path?
tracert 192.168.1.1
ping 127.0.0.1
ping 192.168.1.1
ipconfig 192.168.1.1
That’s right!
Question 1
Multiple choice question
What terms represent the maximum and actual speed that can be
utilized by a device to transfer data?
bandwidth; throughput
throughput; bandwidth
bandwidth; goodput
throughput; goodput
Bandwidth measures the maximum rate at which a device can transfer
data. However, in practice, the actual speed for data transfer could be
reduced because of numerous factors like network congestion,
overhead etc. This actual rate of transfer is known as throughput.
Complete Question 2
Question 2
Multiple choice question
web server
console
server
client
A client device has software installed which enables it to request the
required service from a server device. For instance, a user who uses a
web browser is effectively requesting pages from servers all over the
web. In this case the browser is considered the client, whereas the
device that is responsible for answering the request is considered the
server.
Complete Question 3
Question 3
Multiple choice question
How many unique values are possible using a single binary digit?
1
16
A bit is stored and transmitted as one of two possible discrete states.
Each bit can only have one of two possible values, 0 or 1. The term bit
is an abbreviation of “binary digit” and represents the smallest piece of
data.
Complete Question 4
Question 4
Multiple choice question
difficulty of setup
high cost
The simplest peer-to-peer network consists of two computers that are
directly connected to each other through the use of a wired or wireless
connection. The primary disadvantages of a peer-to-peer network are
its lack of central administration, minimal security, and its lack of
scalability.
Complete Question 5
Question 5
This question component requires you to select the matching option.
When you have selected your answers select the submit button.
Match the term to the value represented.
Eight bits
Approximately one million bytes
Approximately one trillion bytes
A one or a zero
Approximately one billion bytes
Approximately one thousand bytes
Terabyte
Megabyte
Bit
Byte
Kilobyte
Gigabyte
Bluetooth
NFC
Wi-Fi
3G
NFC is a wireless technology that allows data to be exchanged
between devices that are in very close proximity to each other.
Complete Question 9
Question 9
Multiple choice question
personal computer
peripheral
access point
network media
A peripheral is a device that is not directly connected to a network. In
order to be made available on a network, a host is responsible for
sharing the peripheral across the network.
Complete Question 10
Question 10
Multiple choice question
router
DNS server
DHCP server
default gateway
A DNS server is a network device that is used to translate a domain
name to its IP address. A user will identify a website using a domain
name, such as www.cisco.com and a DNS server will translate it to an
associated IP address.
Complete Question 11
Question 11
Multiple choice question
These are optional modules that can be installed into the module slot
if it is currently empty.
Config
Desktop
Programming
Attributes
The Desktop menu item is used to access common applications and
windows used to configure a device such as the IP address, command
prompt, web browser, as well as other apps.
Complete Question 13
Question 13
Multiple choice question
RS 232
USB0
USB1
FastEthernet0
A PC to switch connection is through an Ethernet cable. Connect
FastEthernet0 on the PC to any Ethernet port on the switch.
Complete Question 14
Question 14
Multiple choice question
Refer to the exhibit. An instructor wants to show a few prebuilt Packet
Tracer sample labs in class. Which menu option would the instructor
use to access a sample lab?
File
Edit
Options
View
Tools
Extensions
Use the File > Open Samples menu option to browse for the samples
provided with Packet Tracer.
Complete Question 15
Question 15
Multiple choice question
LED monitor
microwave oven
cordless phone
the cost of the end devices that are used in the network
twisted-pair cable
When you talk with someone, you are communicating. When you mail
a card to your grandfather, you are communicating. You probably
don’t think much about the rules of communication when you do these
two things. But there are rules, and good communication only
happens when all parties know and follow those rules. It is the same
with devices on a network. This module explains the rules, which are
called protocols, of network communication. When you understand the
various protocols and how they work with other protocols, you will not
only understand how networks and the internet work, you will also be
able to troubleshoot problems in your own network! Interested? Good.
Let’s go!
4 Videos
2 Labs
2 Check Your Understanding activities
1 Module Quiz
Network
Communication Standards
5.2.2 The Internet and Standards
That’s right.
That’s right.
There are two basic types of models that we use to describe the
functions that must occur in order for network communications to be
successful: protocol models and reference models.
Question 1
That’s right.
That’s right.
That’s right.
The OSI model data link and network layers correspond to the
network access layer in the TCP/IP model.
Question 4
That’s right.
In the early days of networking, each vendor used its own proprietary
methods of interconnecting network devices and networking protocols.
If you bought equipment from different vendors, there was no
guarantee that the equipment would work together. Equipment from
one vendor might not communicate with equipment from another.
Facilitate design
Simplify product development
Promote competition
Provide consistent interconnections
Facilitate training
Provide more vendor choices for customers
Drag the slider bar in the figure across the timeline to see how
Ethernet standards have developed over time.
When your name is called, you listen to the message and respond.
Other people in the room may hear the message, but they ignore it
because it is not addressed to them.
The Rules
Ethernet
There is no official LAN standard protocol, but over time, Ethernet, has
become more common than the others. Ethernet protocols define how
data is formatted and how it is transmitted over the wired network. The
Ethernet standards specify protocols that operate at Layer 1 and
Layer 2 of the OSI model. Ethernet standards have evolved for
specifying faster and more flexible versions of the technology. Each
version of Ethernet has an associated standard. Each host connected
to an Ethernet network is assigned a physical address which serves to
identify the host on the network. Every Ethernet network interface has
a physical address assigned to it when it is manufactured. This
address is known as the Media Access Control (MAC) address. The
MAC address identifies each source and destination host on the
network.
5.5.2 Communication Principles Quiz
Complete Question 1
Question 1
Multiple choice question
IEEE
ISO
IETF
TIA/EIA
That’s right!
Complete Question 2
Question 2
Multiple choice question
IP address
MAC address
sequence number
TCP port number
That’s right!
Topic 5.3.0 - Ethernet frames are identified at the data link layer by
their MAC addresses, which are unique to each NIC. IP addresses are
used at the network layer, and TCP and UDP port numbers are used
at the transport layer. Sequence numbers are fields in TCP headers.
Complete Question 3
Question 3
Multiple choice question
Which three layers of the OSI model are comparable in function to the
application layer of the TCP/IP model? (Choose three.)
application
presentation
session
transport
data link
physical
network
That’s right!
Complete Question 4
Question 4
Multiple choice question
Which term refers to the set of rules that define how a network
operates?
standard
protocol
model
domain
Complete Question 5
Question 5
Multiple choice question
EIA/TIA
IEEE
ANSI
CCITT
That’s right!
Complete Question 6
Question 6
Multiple choice question
It is 128-bits in length.
It contains two portions, the network portion and the host portion.
That’s right!
Complete Question 7
Question 7
Multiple choice question
Which three elements do all communication methods have in
common? (Choose three.)
message destination
message type
message source
message data
transmission medium
message priority
That’s right!
Complete Question 8
Question 8
Multiple choice question
Which two layers of the OSI model specify protocols that are
associated with Ethernet standards? (Choose two.)
physical layer
network layer
transport layer
session layer
That’s right!
Complete Question 9
Question 9
Multiple choice question
application
presentation
session
transport
network
That’s right!
Complete Question 10
Question 10
Multiple choice question
Which statement defines a data communications protocol?
That’s right!
Introduction
Module Title: Network Design and Access Layer
6.1.2 Encapsulation
A tabbed content container. Content can be text, graphic or both.
The process of placing one message format (the letter) inside another
message format (the envelope) is called encapsulation. De-
encapsulation occurs when the process is reversed by the recipient
and the letter is removed from the envelope. Just as a letter is
encapsulated in an envelope for delivery, so computer messages are
encapsulated.
Analogy
An envelope has the address of the sender and receiver, each located
at the proper place on the envelope. If the destination address and
formatting are not correct, the letter is not delivered.
The process of placing one message format (the letter) inside another
message format (the envelope) is called encapsulation. De-
encapsulation occurs when the process is reversed by the recipient
and the letter is removed from the envelope.
Network
The format for Ethernet frames specifies the location of the destination
and source MAC addresses, and additional information including:
Preamble for sequencing and timing
Start of frame delimiter
Length and type of frame
Frame check sequence to detect transmission errors
Question 1
That’s right.
That’s right.
That’s right.
The Preamble and Start Frame Delimiter (SFD) indicate the beginning
of an Ethernet frame.
Question 4
That’s right.
Ethernet operates at layer 2, the data link layer, of the OSI model.
Both the physical MAC and logical IP addresses are required for a
computer to communicate on a hierarchical network, just like both the
name and address of a person are required to send a letter.
Hierarchical Network Design
Both the physical MAC and logical IP addresses are required for a
computer to communicate on a hierarchical network, just like both the
name and address of a person are required to send a letter.
6.2.5 Hierarchical Analogy
6.2.7 Benefits of a
Hierarchical Design
As shown in the figure, the hierarchical design has three basic layers:
The access layer provides a connection point for end user devices to
the network and allows multiple hosts to connect to other hosts
through a network device, usually a switch, such as the Cisco 2960-
XR shown in the figure, or a wireless access point. Typically, all
devices within a single access layer will have the same network
portion of the IP address.
Distribution Layer
The distribution layer provides a connection point for separate
networks and controls the flow of information between the networks. It
typically contains more powerful switches, such as the Cisco C9300
series shown in the figure, than the access layer as well as routers for
routing between networks. Distribution layer devices control the type
and amount of traffic that flows from the access layer to the core layer.
Core Layer
The core layer is a high-speed backbone layer with redundant
(backup) connections. It is responsible for transporting large amounts
of data between multiple end networks. Core layer devices typically
include very powerful, high-speed switches and routers, such as the
Cisco Catalyst 9600 shown in the figure. The main goal of the core
layer is to transport data quickly.
Question 1
That’s right.
That’s right.
That’s right.
The physical address does not change when the device is connected
to a new network.
Question 4
That’s right.
That’s right.
The access layer is the basic level of the network. It is the part of the
network in which people gain access to other hosts and to shared files
and printers. The access layer provides the first line of networking
devices that connect hosts to the wired Ethernet network.
The original Ethernet networks connected all hosts with a single cable,
similar to how cable TV cables are connected in your home. All users
on the network shared the bandwidth available on the cable. As
Ethernet networks became more popular, connecting everyone on a
single cable was no longer practical, nor even possible. Engineers
developed a different type of network technology that made it easier to
connect and reconnect multiple devices to the network. The first of
these types of networking devices were Ethernet hubs.
Hubs contain multiple ports that are used to connect hosts to the
network. Hubs are simple devices that do not have the necessary
electronics to decode the messages sent between hosts on the
network. Hubs cannot determine which host should get any particular
message. A hub simply accepts electronic signals from one port and
regenerates (or repeats) the same message out all of the other ports.
All hosts attached to the hub share the bandwidth, and will receive the
message. Hosts ignore the messages that are not addressed to them.
Only the host specified in the destination address of the message
processes the message and responds to the sender.
A table on the switch, called a MAC address table, contains a list of all
of the active ports and the host MAC addresses that are attached to
them. When a message is sent between hosts, the switch checks to
see if the destination MAC address is in the table. If it is, the switch
builds a temporary connection, called a circuit, between the source
and destination ports. This new circuit provides a dedicated channel
over which the two hosts can communicate. Other hosts attached to
the switch do not share bandwidth on this channel and do not receive
messages that are not addressed to them. A new circuit is built for
every new conversation between hosts. These separate circuits allow
many conversations to take place at the same time, without collisions
occurring. Ethernet switches also allow for the sending and receiving
of frames over the same Ethernet cable simultaneously. This improves
the performance of the network by eliminating collisions.
6.3.6 The MAC Address Table
This is an animations player component.
How does the MAC address of a new host get into the MAC address
table? A switch builds the MAC address table by examining the source
MAC address of each frame that is sent between hosts. When a new
host sends a message or responds to a flooded message, the switch
immediately learns its MAC address and the port to which it is
connected. The table is dynamically updated each time a new source
MAC address is read by the switch. In this way, a switch quickly learns
the MAC addresses of all attached hosts.
Question 1
That’s right.
That’s right.
That’s right.
That’s right.
Broadcast Containment
Within the local network it is often necessary for one host to be able to
send messages to all the other hosts at the same time. This can be
done using a message known as a broadcast. Broadcasts are useful
when a host needs to find information without knowing exactly what
other host can supply it, or when a host wants to provide information
to all other hosts in the same network in a timely manner.
A message can only contain one destination MAC address. So, how is
it possible for a host to contact every other host on the local network
without sending out a separate message to each individual MAC?
The sending host can use an IPv4 protocol called address resolution
protocol (ARP) to discover the MAC address of any host on the same
local network. IPv6 uses a similar method known as Neighbor
Discovery.
6.4.6 ARP
This is an animations player component.
ARP uses a three step process to discover and store the MAC
address of a host on the local network when only the IPv4 address of
the host is known:
When the sending host has the MAC address of the destination host
in its ARP table, it can send frames directly to the destination without
doing an ARP request. Because ARP messages rely on broadcast
frames to deliver the requests, all hosts in the local IPv4 network must
be in the same broadcast domain.
Question 1
That’s right.
That’s right.
That’s right.
Question 4
That’s right.
That’s right.
A host will send an ARP reply if the IP address in the ARP request
matches its own IP address.
Question 6
That’s right.
An ARP reply will include the IP and MAC address of the host that
sent the reply
6.5.2 Network Design and Access Layer Quiz
Complete Question 1
Question 1
Multiple choice question
0.0.0.0
255.255.255.255
FFFF.FFFF.FFFF
AAAA.AAAA.AAAA
That’s right!
Complete Question 2
Question 2
Multiple choice question
router
Ethernet bridge
Ethernet hub
access point
That’s right!
Topic 6.4.0 - Layer 1 and 2 devices (LAN switch and Ethernet hub)
and access point devices do not filter MAC broadcast frames. Only a
Layer 3 device, such as a router, can divide a Layer 2 broadcast
domain.
Complete Question 3
Question 3
Multiple choice question
encoding
encapsulation
manipulation
segmenting
That’s right!
Complete Question 4
Question 4
Multiple choice question
What is the purpose of the core layer in the Cisco hierarchical network
design model?
That’s right!
Topic 6.2.0 - In the three layer hierarchy, the access layer provides
host connectivity to the network. The distribution layer interconnects
smaller networks, and the core layer provides high-speed connections
at the top of the hierarchy.
Complete Question 5
Question 5
Multiple choice question
hub
router
switch
modem
That’s right!
Complete Question 6
Question 6
Multiple choice question
Refer to the exhibit. How is a frame sent from PCA forwarded to PCC
if the MAC address table on switch SW1 is empty?
SW1 floods the frame on all ports on the switch, excluding the
interconnected port to switch SW2 and the port through which the
frame entered the switch.
SW1 floods the frame on all ports on SW1, excluding the port through
which the frame entered the switch.
SW1 forwards the frame directly to SW2. SW2 floods the frame to all
ports connected to SW2, excluding the port through which the frame
entered the switch.
SW1 drops the frame because it does not know the destination MAC
address.
That’s right!
Topic 6.4.0 - When a switch powers on, the MAC address table is
empty. The switch builds the MAC address table by examining the
source MAC address of incoming frames. The switch forwards based
on the destination MAC address found in the frame header. If a switch
has no entries in the MAC address table or if the destination MAC
address is not in the switch table, the switch will forward the frame out
all ports except the port that brought the frame into the switch.
Complete Question 7
Question 7
Multiple choice question
What information does an Ethernet switch examine and use to build its
address table?
source IP address
destination IP address
That’s right!
Complete Question 8
Question 8
Multiple choice question
Complete Question 9
Question 9
Multiple choice question
access point
firewall
Layer 2 switch
Layer 3 device
modular switch
That’s right!
Topic 6.3.0 - While some designs do route at the access layer, the two
devices that should always be placed at the access layer of the
hierarchical design model are an access point and a Layer 2 switch. A
modular switch is commonly used at the core layer. Routing by a
Layer 3 device is commonly used in the distribution layer. The firewall
is a device in the Internet edge network design.
Complete Question 10
Question 10
Multiple choice question
The more interfaces a router has the larger the resulting broadcast
domain.
That’s right!
Topic 6.4.0 - A switch that receives a broadcast frame will forward the
frame out all other interfaces, including interfaces that connect to other
switches. These switches will also perform the same forwarding
action. By adding more switches to the network, the size of the
broadcast domain increases.
Complete Question 11
Question 11
Multiple choice question
0 to 1024 bytes
32 to 1500 bytes
46 to 1500 bytes
64 to 1518 bytes
That’s right!
Complete Question 12
Question 12
Multiple choice question
to build the MAC address table in a switch from the information that is
gathered
That’s right!
Broadcast containment
Security requirements
Physical locations
Logical grouping
Objectives
Build a simple peer-to-peer network and verify physical connectivity.
Assign various IPv4 addresses to hosts and observe the effects on
network communication
Background / Scenario
In this lab, you will build a simple peer-to-peer network using two PCs
and an Ethernet crossover cable. You will assign various IPv4
addresses to the hosts and determine the effects on their ability to
communicate.
Required Resources
2 PCs (Windows 10 with at least one wired Ethernet NIC on each PC)
1 Ethernet cross-over cable to connect the PCs (provided by
instructor)
Instructions
Part 1: Create a Peer-to-Peer Network
Now that the two PCs are physically connected and configured
correctly with IPv4 addresses, we need to make sure they can
communicate with each other. The ping command is a simple way to
accomplish this task.
Navigate to the Command Prompt on PC-A. In a Command Prompt on
PC-A, ping 192.168.1.2. A successful ping will verify network
connectivity and PC-A can communicate with PC-B.
C:\Users\Student> ping 192.168.1.2
Pinging 192.168.1.2 with 32 bytes of data:
Answer Area
Type your answer here.
The ping was unsuccessful because PC-A and PC-B are no longer in
the same subnet. Without a router, these PCs cannot communicate
with each other.
Hide Answer
What type of networking device would allow the PCs to communicate
even though they are on different networks?
Answer Area
Type your answer here.
Answer Area
Type your answer here.
Answer Area
Type your answer here.
The ping was successful because PC-A and PC-B are in the same
subnet.
Hide Answer
Step 5: (Optional – Use only if the Firewall was originally ENABLED)
Re-enable the firewall.
To ensure that the PC is protected from unauthorized access, re-
enable the Windows Firewall.
To access Windows Firewall, click Settings > Network & Internet >
Ethernet > Windows Firewall > Turn Windows Firewall on or off.
Click Play in the figure to see the router forward packets and block
broadcasts.
7.2.2 Path Selection
This is an animations player component.
How does the router determine which interface to use to send the
message on a path to get to the destination network?
Each port, or interface, on a router connects to a different local
network. Every router contains a table of all locally connected
networks and the interfaces that connect to them. These routing tables
can also contain information about the routes, or paths, that the router
uses to reach other remote networks that are not locally attached.
Click Play in the figure to see the router forward packets and block
broadcasts.
How does the source host determine the MAC address of the router?
A host is given the IPv4 address of the router through the default
gateway address configured in its TCP/IP settings. The default
gateway address is the address of the router interface connected to
the same local network as the source host. All hosts on the local
network use the default gateway address to send messages to the
router. When the host knows the default gateway IPv4 address, it can
use ARP to determine the MAC address. The MAC address of the
router is then placed in the frame, destined for another network.
Create a LAN
7.3.1 Local Area Networks
This is an animations player component.
The important thing to remember is that all the local networks within a
LAN are under one administrative control. Other common
characteristics of LANs are that they typically use Ethernet or wireless
protocols, and they support high data rates.
The term intranet is often used to refer to a private LAN that belongs
to an organization, and is designed to be accessible only by the
members of the organization , employees, or others with authorization.
All hosts are in one broadcast domain which causes more traffic
on the segment and may slow network performance
Harder to implement QoS
Harder to implement security
7.3.3 Packet Tracer - Observe Data Flow in a LAN
Instructions
Part 3: Observe the flow of data from PC-A to PC-C by creating network traffic.
a. Switch to Simulation Mode in the bottom right-hand corner.
b. Click Edit Filter in the Edit List Filter area. In the event list filter, click All/None to deselect every
filter. Click Edit Filter. Select ARP and ICMP filters under IPv4 tab.
c. Select a Simple PDU by clicking the closed envelope in the upper toolbar. With the envelop icon,
click PC-A to establish the source. Click PC-C to establish the destination.
Note: Notice that two envelopes are now positioned beside PC-A. One envelop is ICMP, while
the other is ARP. The Event List in the Simulation Panel will identify exactly which envelop
represents ICMP and which represents ARP.
d. Select Play from the Play Controls in the Simulation Panel. You can speed up the simulation
using the Play Speed Slider. The Play Speed Slider is located below Play inside the Simulation
Panel. Dragging the button to the right will speed up the simulation, while dragging is to the left
will slow down the simulation.
e. Observe the path ICMP and ARP envelope. Click View Previous Event to continue when the
buffer is full.
f. Click Reset Simulation in the Simulation Panel. Notice that the ARP envelop is no longer
present. This has reset the simulation but has not cleared any configuration changes or dynamic
table entries, such as ARP table entries. The ARP request is not necessary to complete the ping
because PC-A already has the MAC address in the ARP table.
g. Click Capture then Forward inside the Simulation Panel. The ICMP envelop will moved from the
source to the switch and stop. The Capture then Forward allows you to move the simulation one
step at a time. Continue selecting the Capture then Forward until you complete the event.
h. Click the Power Cycle Device on the bottom left, above the device icons.
i. An error message will appear asking you to confirm reset. Click Yes. Now both the ICMP and
ARP envelops are present again. The power cycle will clear any configuration changes not saved
and will clear all dynamic table entries, such as the ARP and MAC table entries.
j. Exit the simulation mode by clicking Realtime a allow the network to converge.
k. After the network has converged, enter the simulation mode.
g. Examine the ARP tables for PC-B and PC-C. Close the Command Prompt window when
finished.
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
PC-A NIC 192.168.10.2 255.255.255.0 192.168.10.1
PC-B NIC 192.168.10.3 255.255.255.0 192.168.10.1
Objectives
Background / Scenario
For a PC to communicate in the local network and the Internet, it must be connected to a
network device.
Required Resources
Instructions
Why do you think the IPv4 addresses are different, but the subnet masks and default gateways
are the same?
Answer Area
Student’s own opinion on this. Each device on the network must have a unique identifier.
The IPv4 address is one way of uniquely identifying each network host or device. The
default gateway represents the way of communicating with devices that are NOT on your
own network.
Hide Answer
In Part 2 of this lab, you will ping another PC on the LAN and capture ARP requests and replies
in Wireshark. You will also look inside the frames captured for specific information. This analysis
should help to clarify how packet headers are used to transport data to their destination.
Besides the ipconfig /all command, you can print the name of the current host using
the hostname command.
C:\Users\Student> hostname
DESKTOP-3FR7RKA
Sometimes you just need to quickly list all the MAC addresses for the NIC on the PC.
The getmac command could be quite useful.
C:\Users\Student> getmac
Physical Address Transport Name
00-50-56-B3-E8-C1 \Device\Tcpip_{B0D0B9B3-8A23-4B59-B930-323792047552}
02-00-4C-4F-4F-50 \Device\Tcpip_{31C9748F-BCD8-4C76-8AEB-D4BC482341B8}
The route command allows you to manipulate the network routing table. For this example, you
will print out the routes.
======================================================================
=====
Interface List
======================================================================
=====
======================================================================
=====
Active Routes:
======================================================================
=====
Persistent Routes:
None
IPv6 Route Table
======================================================================
=====
Active Routes:
3 266 fe80::8050:173e:a32b:55c/128
On-link
6 266 fe80::ac29:44a8:6409:c30e/128
On-link
1 306 ff00::/8 On-link
6 266 ff00::/8 On-link
3 266 ff00::/8 On-link
======================================================================
=====
Persistent Routes:
Page progress. Use this to listen to the list of regions in this topic and
whether they're completed. You can jump directly to any that are
incomplete or which sound particularly interesting. 6%
The health gauge reflects your performance during the course You
now have 85.71428571428571% health
As networks grow, you may need to divide one access layer network
into multiple access layer networks. The distribution layer connects
these independent local networks and controls the traffic flowing
between them. It is responsible for ensuring that traffic between hosts
on the local network stays local. Networking devices that make up the
distribution layer are designed to interconnect networks, not individual
hosts.
Devices that are beyond the local network segment are known as
remote hosts. When a source device sends a packet to a remote
destination device, then routing is needed. Routing is the process of
identifying the path to a destination. A router is a networking device
that connects multiple Layer 3, IP networks. At the distribution layer of
the network, routers direct traffic and perform other functions critical to
efficient network operation. Routers, like switches, are able to decode
and read the messages that are sent to them. Unlike switches, which
make their forwarding decision based on the Layer 2 MAC address,
routers make their forwarding decision based on the destination Layer
3 IP address.
How does the source host determine the MAC address of the router?
A host is given the IPv4 address of the router through the default
gateway address configured in its TCP/IP settings. The default
gateway address is the address of the router interface connected to
the same local network as the source host.
Create a LAN
Questions samples
source IP address
destination IP address
That’s right!
Question 2
Multiple choice question
A router receives a packet from the Gigabit 0/0 interface and
determines that the packet needs to be forwarded out the Gigabit 0/1
interface. What will the router do next?
Question 3
Question 4
Multiple choice question
During the process of forwarding traffic, what will the router do
immediately after matching the destination IP address to a network on
a directly connected routing table entry?
That’s right!
Question 5
Multiple choice question
The router will save it in the sending queue and try to forward it again
later.
Question 6
Multiple choice question
Question 7
Multiple choice question
static route
default route
That’s right!
Topic 7.2.0 - Some of the IPv4 routing table codes include the
following:
C – directly connected
S – static
D – EIGRP
* - candidate default
Question 8
Multiple choice question
host portion
broadcast address
network portion
gateway address
That’s right!
Topic 7.2.0 - There are two parts to an a network layer address, the
network and host portions. Routers are not concerned about delivering
packets to hosts. Routers are concerned with delivering packets to the
network that a destination host is a member of.
Question 9
Multiple choice question
What role does a router play on a network?
That’s right!
Topic 7.1.0 - When a computer sends a packet onto the network, the
packet includes a source and destination IP address. Routers use the
destination IP address in a packet to forward the packet to the correct
destination network.
Question 10
Multiple choice question
Question 11
Multiple choice question
the IPv4 address of the router interface that is connected to the same
LAN
That’s right!
Topic 7.2.0 - The default gateway is used when a host needs to send
messages to destinations that are located in remote networks. The
default gateway address is configured on the host with the IPv4
address of the router interface that is connected to the same local
network as the host.
The Internet Protocol
Now you know that you need a router to get outside of your local
network. But routers alone can’t do the job. You need a proper IP
address for both the source and the destination address. There is a lot
to know about IP addresses, including that each one has a network
portion and a host portion. But, of course, there is more to IP
addresses than that. This module explains the Internet Protocol, the
structure of an IPv4 address, as well as how and when it is used.
But wait! There’s more! You will learn how to convert a binary IPv4
address to decimal and vice versa. Believe me, it’s more fun than it
sounds AND knowing how to do this will put you ahead of the pack!
Every packet sent across the internet has a source and destination
IPv4 address. This information is required by networking devices to
ensure the information gets to the destination and any replies are
returned to the source.
Click Play in the figure to see how packets travel across the internet.
In this activity, you will observe how packets are sent across the
internet using IP addresses.
Connect to a Web Server
Observe how packets are sent across the Internet using IP addresses.
Instructions
A reply verifies connectivity from the client to the destination web server. The reply may time out
initially while devices load and ARP is performed.
d. Close the command prompt window only, by selecting the x within the command prompt
window. Be sure to leave the PC0 configuration window open.
What messages did you see after the web page has finished loading?
Answer Area
It is very difficult for humans to read a binary IPv4 address. For this
reason, the 32 bits are grouped into four 8-bit bytes called octets. An
IPv4 address in this format is hard for humans to read, write, and
remember. To make the IPv4 address easier to understand, each
octet is presented as its decimal value, separated by a decimal point
or period. This is referred to as dotted-decimal notation.
As shown in the figure, you can determine the value of the octet by
adding the values of positions wherever there is a binary 1 present:
Instructions
The Binary Game presents problems which you must solve in order to
gain points. When presented with a number on the right, click the
appropriate squares to the left to represent that number. Yellow
squares are counted, while red squares are not. Sometimes there will
be yellow squares that are incorrect. Click them to turn them to red.
When there is no number present to the right, click the empty box to
bring up a number pad. Click the numbers to enter in the correct
answer represented by the yellow squares to the left. Click the Enter
arrow at the bottom-right corner to enter the answer.
The first two problems have unlimited time. After they have been
solved, the problems will get harder and appear faster. When the
screen fills up with unsolved problems, the game is over.
Game Link: https://learningnetwork.cisco.com/docs/DOC-1803
You will need to log in to cisco.com to use this link. It will be necessary
to create an account if you do not already have one.
There are also a variety of free mobile binary games. Search for
"Binary Game" in your app store.
Background / Scenario
When working with networking devices, a network technician should understand binary and
decimal numbers. In this lab, you will use the Windows Calculator application to convert
between these numbering systems. You will also use the “powers” function to determine the
number of hosts that can be addressed based on the number of bits available.
Required Resources
PC (Windows 10)
Instructions
a. Open the Windows Calculator application. Click Start, type Calculator. Select Calculator
in the results.
Answer Area
Answers can vary. It can be in the Standard, Scientific, Programmer, Date calculator or
Converter.
Hide Answer
b. Click the Open Navigation icon (≡) located in the upper left-hand corner. The Windows
calculator supports different mode of calculations.
The five calculator modes are Basic, Scientific, Programmer, Date calculation, and
Converter.
Hide Answer
a. To switch between calculator modes, click the Open Navigation icon (≡) and select
desired mode.
b. Practice switching between calculator modes to see which options they provide.
Answer Area
The standard mode is for basic math. The Scientific mode is for more advanced
calculations. The Programmer mode supports different number systems, such as binary,
hexadecimal, octal, and decimal. The Data calculation is for working with date. The
Converter is for converting between different units of measurements.
Hide Answer
Answer Area
DEC
Hide Answer
Answer Area
0 thru 9
Hide Answer
c. Click BIN.
Answer Area
0 and 1
Hide Answer
Answer Area
Hide Answer
d. Click DEC. Using your mouse, click on the number 1 followed by the number 5 on the
number pad. The decimal number 15 has now been entered.
e. Now click BIN.
What happened to the number 15 listed in the textbox at the top of the window?
Answer Area
Hide Answer
Answer Area
11011100
Hide Answer
f. Clear the binary value representing 220 in the window. From Binary mode, type in the
following binary number: 11001100. Select the DEC.
Answer Area
204
Hide Answer
Step 2: Practice the conversion between binary and decimal numbering system.
86
Answer Area
175
Answer Area
204
Answer Area
19
Answer Area
Decimal Binary
86 01010110
175 10101111
204 11001100
19 00010011
Hide Answer
Binary Decimal
1100 0011
Answer Area
0010 1010
Answer Area
0011 1000
Answer Area
Binary Decimal
1001 0011
Answer Area
Binary Decimal
0010 1010 42
0011 1000 56
Hide Answer
a. Computer hosts usually have two addresses, an Internet Protocol (IP) address and an
Ethernet Media Access Control (MAC) address. For the benefit of humans, the IP
address is normally represented as a dotted decimal notation, such as 192.168.10.2.
Each of the decimal octets in the address or a mask can be converted to 8 binary bits.
Remember that the computer only understands binary bits.
If all 4 octets were converted to binary, how many bits would there be?
Answer Area
Hide Answer
b. IP addresses are normally shown with four decimal numbers ranging from 0 to 255 and
separated by a period.
192
Answer Area
168
Answer Area
10
Answer Area
2
Answer Area
Decimal Binary
192 11000000
168 10101000
10 1010
2 10
Hide Answer
Subnet masks, such as 255.255.255.0, are also represented as dotted decimal. A subnet mask
will always consist of four 8-bit octets, each one represented as a decimal number. With the
exception of decimal 0 (all 8 binary zeros) and decimal 255 (all 8 binary ones), each octet will
have some number of ones on the left and some number of zeros on the right.
Decimal Binary
0
Answer Area
Decimal Binary
128
Answer Area
192
Answer Area
224
Answer Area
240
Answer Area
248
Answer Area
252
Answer Area
254
Answer Area
255
Answer Area
Decimal Binary
0 00000000
128 10000000
192 11000000
224 11100000
240 11110000
248 11111000
252 11111100
Decimal Binary
254 11111110
255 11111111
Hide Answer
Decimal Binary
255
Answer Area
255
Answer Area
255
Answer Area
0
Answer Area
Decimal Binary
255 11111111
255 11111111
255 11111111
0 00000000
Hide Answer
1. Binary numbers use two digits, 0 and 1. When you calculate how many hosts can be on
a subnetwork, you use powers of two because binary is being used. As an example, we
have a subnet mask that leaves six bits in the host portion of the IP address. In this
case, the number of hosts on that network is 2 to the 6th power minus 2 (because you
need a number to represent the network and a number that can be used to reach all the
hosts—the broadcast address). The number 2 is always used because we are working
in binary. The number 6 is the number of bits that are used for the host bits.
2. Change the calculator view to Scientific mode. Input the number 2. Select the xy key on
the calculator, the key which raises a number to a power. Input the number 6. To
compete the operation, click on the = key, press Enter on the keyboard, or press the =
key on the keyboard. The number 64 appears in the output. To subtract two, click on the
minus (-) key and then the 2 key followed by the = key. The number 62 appears in the
output. This means 62 hosts could be utilized.
Using the previously described process, determine the number of hosts if the following number
of bits are used for host bits.
5
Answer Area
14
Answer Area
24
Answer Area
10
Answer Area
5 30
14 16382
24 16777214
10 1022
Hide Answer
Using a similar technique as learned previously, determine what 10 to the 4th power equals.
Answer Area
10000
Hide Answer
Reflection
List one other thing for which you might use the Windows Calculator scientific mode. It does not
have to be related to networking.
Answer Area
True or False: The User Datagram Protocol (UDP) does not use acknowledgments to
track the receipt of segments.
Logical AND is the comparison of two bits that produce the results
shown in the following. Note how only a 1 AND 1 produce a 1.
1 AND 1 = 1
0 AND 1 = 0
1 AND 0 = 0
0 AND 0 = 0
The subnet mask is compared to the IPv4 address from left to right, bit
for bit. The 1s in the subnet mask represent the network portion; the
0s represent the host portion. In the example shown, the first three
octets are network, and the last octet represents the host.
When a host sends a packet, it compares its subnet mask to its own
IPv4 address and the destination IPv4 address. If the network bits
match, both the source and destination host are on the same network
and the packet can be delivered locally. If they do not match, the
sending host forwards the packet to the local router interface to be
sent on to the other network.
Click Play in the figure to see how H1 uses its subnet mask to
determine if H2 is on the same network.
The subnet masks we see most often with home and small business
networking are: 255.0.0.0 (8-bits), 255.255.0.0 (16 bits) and
255.255.255.0 (24 bits). A subnet mask of 255.255.255.0 (decimal) or
11111111.11111111.1111111.00000000 (binary) uses 24 bits to
identify the network number which leaves 8 bits to number the hosts
on that network, as shown in the figure.
To calculate the number of hosts that can be on that network, take the
number 2 to the power of the number of host bits (2 ^ 8 = 256). From
this number, we must subtract 2 (256-2). The reason we subtract 2 is
that all 1s within the host portion of an IPv4 address is a broadcast
address for that network and cannot be assigned to a specific host. All
0s within the host portion indicate the network ID and again, cannot be
assigned to a specific host. Powers of 2 can be calculated easily with
the calculator that comes with any Windows operating system.
With a 16-bit mask, there are 16 bits (two octets) for host addresses
and a host address could have all 1s (255) in one of the octets. This
might appear to be a broadcast but as long as the other octet is not all
1s, it is a valid host address. Remember that the host looks at all host
bits together, not at octet values.
8.3.9 Activity - ANDing to
Determine the Network
Address
Instructions:
Use the ANDing process to determine the network address (in binary
and decimal formats).
Question 1
This is a multiple choice question. Once you have selected an option,
select the submit button below
10.0.0.0
10.5.0.0
10.5.4.0
10.5.4.100
Question 2
This is a multiple choice question. Once you have selected an option,
select the submit button below
172.0.0.0
172.16.0.0
172.16.4.0
172.16.4.100
Question 3
This is a multiple choice question. Once you have selected an option,
select the submit button below
Host-A has the IPv4 address and subnet mask 10.5.4.100
255.255.255.0. Which of the following IPv4 addresses would be on the
same network as Host-A? (Choose all that apply)
10.5.4.1
10.5.0.1
10.5.4.99
10.0.0.98
10.5.100.4
Question 4
This is a multiple choice question. Once you have selected an option,
select the submit button below
172.16.4.99
172.16.0.1
172.17.4.99
172.17.4.1
172.18.4.1
Question 5
This is a multiple choice question. Once you have selected an option,
select the submit button below
192.168.0.1
192.168.0.100
192.168.1.1
192.168.1.100
192.168.2.1
Classful addressing was abandoned in the late 1990s for the newer
and current classless addressing system.
10.0.0.0 /8 or 10.0.0.0 to 10.255.255.255
172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255
Most organizations use private IPv4 addresses for their internal hosts.
However, these RFC 1918 addresses are not routable in the internet
and must be translated to a public IPv4 address. Network Address
Translation (NAT) is used to translate between private IPv4 and public
IPv4 addresses. This is usually done on the router that connects the
internal network to the ISP's network.
Home routers provide the same capability. For instance, most home
routers assign IPv4 addresses to their wired and wireless hosts from
the private address of 192.168.1.0 /24. The home router interface that
connects to the internet service provider (ISP) network is assigned a
public IPv4 address.
8.5.2 Assignment of IPv4 Addresses
This is an animations player component.
Both IPv4 and IPv6 addresses are managed by the Internet Assigned
Numbers Authority (IANA) (http://www.iana.org). The IANA manages
and allocates blocks of IP addresses to the Regional Internet
Registries (RIRs).
Instructions:
Hosts that receive particular multicast data are called multicast clients.
The multicast clients use services requested by a client program to
subscribe to the multicast group.
Classful addressing was abandoned in the late 1990s for the newer
and current classless addressing system.
These addresses are not routable in the internet. Before an ISP can
forward a packet with a private address out to the internet, the
address must be translated to a public IPv4 address using NAT.
Public addresses (both IPv4 and IPv6) must be unique, and use of
them is regulated and allocated to each organization separately.
Public addresses are managed by the IANA. The IANA manages and
allocates blocks of IP addresses to the RIRs. RIRs are responsible for
allocating IP addresses to ISPs who, in turn, provide IPv4 address
blocks to organizations and smaller ISPs.
That’s right!
172.16.4.4
172.32.5.2
192.167.10.10
10.1.1.1
192.168.5.5
224.6.6.6
That’s right!
Question 3
Multiple choice question
240.0.0.0 - 254.255.255.255
224.0.0.0 - 239.255.255.255
169.254.0.0 - 169.254.255.255
127.0.0.0 - 127.255.255.255
That’s right!
Question 4
Multiple choice question
That’s right!
Question 5
Multiple choice question
What are three characteristics of a multicast transmission? (Choose
three.)
Question 6
Multiple choice question
Question 7
Multiple choice question
172.32.65.0
172.32.65.32
172.32.0.0
172.32.32.0
That’s right!
Topic 8.4.0 - In classful IPv4 addressing, a network with the first octet
of 172 is a Class B network with the default subnet mask 255.255.0.0.
Thus the network address is 172.32.0.0.
Question 8
Multiple choice question
A technician is setting up equipment on a network. Which three
devices will need IP addresses? (Choose three.)
an IP phone
a wireless mouse
Question 9
Multiple choice question
broadcast
multicast
simulcast
unicast
That’s right!
Question 9
Multiple choice question
broadcast
multicast
simulcast
unicast
That’s right!
Complete Question 10
Question 10
Multiple choice question
196
202
212
240
That’s right!
Question 11
Multiple choice question
How many usable hosts are available given a Class C IP address with
the default subnet mask?
252
254
255
256
That’s right!
Question 12
Multiple choice question
Binary numbers consist of three states: on, off, null. Decimal numbers
do not have states.
That’s right!
You have unlimited attempts to pass the exam so please go back and
review any of the module content if you need to. Good luck!
Question 1
Multiple choice question
Which three layers of the OSI model map to the application layer of
the TCP/IP model? (Choose three.)
network
application
transport
session
presentation
data link
The application layer of the TCP/IP model maps to the top three layers
of the OSI model, which are the application, presentation, and session
layers.
Question 2
Multiple choice question
The first three bytes are used by the vendor assigned OUI.
Question 3
Multiple choice question
What is indicated by the 100 in the 100BASE-T standard?
meters
feet
Question 4
Multiple choice question
Which two OSI model layers have the same functionality as two layers
of the TCP/IP model? (Choose two.)
data link
physical
network
session
transport
The OSI transport layer is functionally equivalent to the TCP/IP
transport layer, and the OSI network layer is equivalent to the TCP/IP
internet layer. The OSI data link and physical layers together are
equivalent to the TCP/IP network access layer. The OSI session layer
(with the presentation layer) is included within the TCP/IP application
layer.
Question 5
Multiple choice question
TCP/IP technologies
wireless LANs
Question 6
Multiple choice question
Question 7
Multiple choice question
decoding
flow control
access control
encapsulation
Encapsulation is the process of placing one message format into
another message format. An example is how a packet is placed in its
entirety into the data field as it is encapsulated into a frame.
Question 8
Multiple choice question
Which logical address is used for delivery of data to a remote
network?
destination IP address
source IP address
Question 9
Multiple choice question
Forward the frame out all ports except the port where the frame is
received.
Question 10
Multiple choice question
Replace the switches with switches that have more ports per switch.
This will allow more devices on a particular switch.
Segment the LAN into smaller LANs and route between them.
Replace at least half of the switches with hubs to reduce the size of
the broadcast domain.
By dividing the one big network into two smaller network, the network
administrator has created two smaller broadcast domains. When a
broadcast is sent on the network now, the broadcast will only be sent
to the devices on the same Ethernet LAN. The other LAN will not
receive the broadcast.
Question 11
Multiple choice question
packet forwarding
microsegmentation
path selection
flow control
A router accepts a packet and accesses its routing table to determine
the appropriate exit interface based on the destination address. The
router then forwards the packet out of that interface.
Complete Question 12
Question 12
Multiple choice question
Question 13
Question 14
Multiple choice question
Question 15
Multiple choice question
Share the routing table with the hosts on the local network.
Question 16
Multiple choice question
Question 17
Multiple choice question
subnet portion
network portion
logical portion
host portion
physical portion
broadcast portion
An IPv4 address is divided into two parts: a network portion - to
identify the specific network on which a host resides, and a host
portion - to identify specific hosts on a network. A subnet mask is used
to identify the length of each portion.
Question 18
Multiple choice question
unicast
dynamic
multicast
broadcast
A communication that has a single source going to a single destination
is a unicast. A communication from a single source to a group of
destinations is a multicast. A communication from a single source to
all destinations on the same local network is a broadcast.
Question 19
Multiple choice question
201.34.45.0
192.16.43.67
226.34.15.78
195.124.45.255
The IP addresses 201.34.45.0, 192.16.43.67, and 195.124.45.255 are
Class C addresses. With the default subnet mask of 255.255.255.0,
192.16.43.67 is a unicast address or host address, 195.124.45.255 is
a broadcast address, and 201.34.45.0 is a network address. IP
address 226.34.15.78 is a Class D multicast address.
Complete Question 20
Question 20
Multiple choice question
10.1.1.1
172.32.5.2
192.167.10.10
172.16.4.4
192.168.5.5
224.6.6.6
The private IP addresses are within these three ranges:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
Introduction
If you have already built a home network, then this module is a good
refresher for you, because there is a lot of technology to choose from
in home networks. If you’ve not set up such a network, this module will
teach you everything you need know.
Not long ago, home networks consisted of a desktop PC, a modem for
internet, and perhaps a printer. In the homes of today, there are
dozens of devices that rely on network connectivity. We can watch our
security cameras from apps on our smart phones, make a telephone
call from our PCs, and stream live video content from anywhere in the
world.
Desktop computers
Gaming systems
Smart TV systems
Printers
Scanners
Security cameras
Telephones
Climate control devices
Small business and home routers typically have two primary types of
ports:
Question 1
This is a multiple choice question. Once you have selected an option,
select the submit button below
True or False? A home router typically only provides wired access to
the network. You have to buy a separate device for wireless access.
false
true
Coaxial Cable
Coaxial cable has an inner wire surrounded by a tubular insulating
layer, that is then surrounded by a tubular conducting shield. Most
coax cables also have an external insulating sheath or jacket.
That’s right.
Wireless Standards
13.3.1 Wi-Fi Networks
A number of standards have been developed to ensure that wireless devices can communicate.
They specify the RF spectrum used, data rates, how the information is transmitted, and more.
The main organization responsible for the creation of wireless technical standards is the IEEE.
The IEEE 802.11 standard governs the WLAN environment. There are amendments to the IEEE
802.11 standard that describe characteristics for different standards of wireless communications.
Wireless standards for LANs use the 2.4 GHz and 5 GHz frequency bands. Collectively these
technologies are referred to as Wi-Fi.
Another organization, known as the Wi-Fi Alliance, is responsible for testing wireless LAN
devices from different manufacturers. The Wi-Fi logo on a device means that this equipment
meets standards and should operate with other devices that use the same standard.
Wireless standards are constantly improving the connectivity and speed of Wi-Fi networks. It is
important to be aware of new standards as they are introduced because manufacturers of wireless
devices will implement these standards quickly in their new products.
Do you have a wireless network in your home? Do you know what standards are supported by
your wireless router?
Network Mode
Question 1
That’s right.
Question 2
That’s right.
Question 3
That’s right.
Question 1
Multiple choice question
network name
router location
encryption
IP address
Encryption configured on the wireless router can provide secure
communications and stop outsiders from using your home network.
Complete Question 2
Question 2
Multiple choice question
What two IEEE 802.11 wireless standards operate only in the 5 GHz
range? (Choose two.)
802.11g
802.11a
802.11n
802.11b
802.11ad
802.11ac
The 802.11a and 802.11ac standards operate only in the 5 GHZ
range. The 802.11b and 802.11g standards operate only in the 2.4
GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz
ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz
ranges.
Complete Question 3
Question 3
Multiple choice question
900 MHz
5 GHz
60 GHz
2.4 GHz
900 MHz is an FCC wireless technology that was used before
development of the 802.11 standards. 900 MHz devices have a larger
coverage range than the higher frequencies have and do not require
line of sight between devices. 802.11b/g/n/ad devices all operate at
2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad
devices operate at 60 GHz.
Complete Question 5
Question 5
Multiple choice question
ease of expansion
ease of installation
micromarketing
virtualization
data analytics
Cloud computing
Cloud computing allows organizations to eliminate the need for on-site
IT equipment, maintenance, and management. Cloud computing
allows organizations to expand their services or capabilities while
avoiding the increased costs of energy and space.
Complete Question 7
Question 7
Multiple choice question
Which three steps must be completed to manually connect an Android
or IOS device to a secured wireless network? (Choose three.)
Complete Question 8
Question 8
Multiple choice question
satellite
dial-up
cable
cellular
DSL
Cable and DSL Internet technologies both use physical cabling to
provide an Internet connection to a residence or a small business.
Although dial-up is a wired technology, it does not provide a high-
speed Internet connection. Satellite and cellular connections provide a
wireless Internet connection.
Complete Question 9
Question 9
Multiple choice question
DSL modem
cable modem
satellite modem
Wi-Fi AP
DSL technology uses the existing telephone network. For that reason,
a DSL modem commonly has an RJ-11 phone port.
Complete Question 11
Question 11
Multiple choice question
Internal threats can cause even greater damage than external threats.
Early Internet users often engaged in activities that would harm other
users.
Internal threats can be intentional or accidental and cause greater
damage than external threats because the internal user has direct
access to the internal corporate network and corporate data.
Complete Question 12
Question 12
Multiple choice question
pretexting
vishing
malware
phishing
zombies
brute force
Attacks aimed at exploiting human behavior such as pretexting,
phishing, and vishing are commonly used by hackers to obtain
information directly from authorized users.
Complete Question 13
Question 13
Multiple choice question
spyware
social engineering
denial of service
virus
Social engineering attacks deceive users into revealing private
information or performing specific actions.
Complete Question 14
Question 14
Multiple choice question
phishing
brute force
pretexting
DDoS
In a brute force attack an attacker will try to gain access to a system
by guessing passwords as fast as possible.
Complete Question 15
Question 15
Multiple choice question
switch
firewall
access point
bridge
Firewalls are used to permit or block traffic between networks
according to access control policies.
Complete Question 17
Question 17
Multiple choice question
NAT overload
port forwarding
static NAT
PAT
Port forwarding allows connections to one port on the external
interface to be redirected to a specific device and a specific port on
the inside interface. In this way specific inside services can be
accessible from the outside network without permitting all traffic to the
inside device.
Complete Question 18
Question 18
Multiple choice question
easily crackable
its age
Despite improvements, WEP is still vulnerable to various security
issues including the ability to be cracked.
Complete Question 20
Question 20
Multiple choice question