... gateway
Self Test 97
A. RJ-11
B. RG 58
C. SC
D. BNC
As a Network technician for 123 LLC, you are asked by your 12.
CIO about the access method of Gigabit Ethernet. Which of the
following access ... technician for 123 Corp plans out the maximum length of a 13.
Gigabit Ethernet segment using MMF optic cable is. What is the cor-
rect distance? (Choose only one)
A. 100 m
B. 125 m
C....
...
that transmits and receives electrical signals across the transmission media.
They are also the part of the interface that actually connects to the media.
Transceiver types can be classified as ... external.
Self Test 95
A. 100 m
B. 185 m
C. 500 m
D. 2 km
Examine the illustration shown in Figure 2 .127 . . Your network
is a 10Base2 network, and it uses these connectors to attach to...
...
Wireless traffic, like its wired counterpart, consists of frames transmitted
from one station to another. The primary feature that sets wireless networks
apart from wired networks is that at least ... commu-
nication range of each other. Ad-hoc
networks are created spontaneously
between the network participants.
In infrastructure mode, APs provide
more permanent structure for the
netwo...
... solutions. Some
of these mechanisms are internal to Windows itself, while others are
third-party solutions or part of the IEEE 802.11 standard. In this sec-
tion, we will be focusing primarily on ... computer is outlined in
Exercise 5.1.
Summary of Exam Objectives 221
SITE SURVEYS
A site survey is part of an audit done on wireless networks. Site surveys allow
system and network admini...
... users who wanted to connect to
a network had to obtain the TCP/IP protocol suite from a third party and
install it. TCP/IP did not come bundled with the software. At times, the
TCP/IP software ... routable because they include address-
ing schemes that identify both the network or subnet and the particular
client on that network or subnet. Other network/transport protocols, such
as NetB...
... holds true today that you should know
about these technologies for the exam, so do not overlook studying for them.
CHAPTER 6: The OSI Model and Networking Protocols 258
in terms of the limitations ... interface was written, that main-
frame still could communicate only
with its specified counterpart. If
either mainframe’s operating system
changed, the interface might be
broken and progra...
... in
the packet headers.
IPv6
IPv6 addresses are 128 -bit addresses expressed as AAAA:AAAA:
AAAA:AAAA:AAAA:AAAA:AAAA:AAAA.
IPv6 addresses are 128 -bit identifiers for interfaces and sets of
interfaces, ... (w) and have an address range of 1.x.y.z
to 126 .x.y.z. Class B networks use the first two octets for the network ID and
have an address range of 128 .0.y.z to 191.255.y.z. Class...
... device.
A port is described as well known for a particular
service when it is normal and common to find that
particular software running at that particular port
number. For example, Web servers ... 2000 8787, 54320, and 54321 (modifiable)
OpwinTrojan 10000 and 10005
SubSeven 124 3, 1999, 2773, 2774, 6667, 6711, 6 712, 6713, 6776, 7000,
7215, 16959, 27374, 27573, and 54283 (depending on the...
... targeting attacks and attack methodologies. This
is perhaps the reason that CompTIA has been focusing many questions in
this particular area. Although there are many different varieties and methods ... or guesses about replies, and
informed attacks in which the attacker can monitor, and therefore partici-
pate in, bidirectional communications.
There are ways to combat spoofing, however. S...