You are on page 1of 3

Network+ Practice Points

Explanation: T3 is the equivalent of approximately 28 T1 carrier lines

T3 technology provides 672 64Kbps voice or data channels.

L2TP is an extension of PPTP over IP and uses UDP port 1701. L2TP lets you separate the physical and
data-link connecting point from tunneling hardware and software. TCP/IP, IPX, and AppleTalk can be
sent over L2TP. IP Security (IPSec) works with L2TP to provide end-to-end authentication and privacy.

The ARP utility will provide you with the Internet Address, the Physical Address, and the Type of
machines on your network.
***********************************************************************************
*
You need to create a reverse lookup zone on your DNS server for your network of 199.230.50.0.
What would be the appropriate zone name?

1. 199.230.50.0.in-addr arpa
2. 199.230.50.in-addr arpa
3. 0.50.230.199.in-addr arpa
4. 50.230.199.in-addr arpa

Correct answer(s): 4
Explanation: To determine the reverse lookup zone, take the network ID from the networks
address and reverse its order and add in-addr arpa after it. So for a class B network of
134.62.70.0, the reverse lookup zone would be 70.62.134.in-addr arpa.
***********************************************************************************
*

Packet switching refers to protocols in which messages are divided into packets before they are sent.
Each packet is then transmitted individually and can even follow different routes to its destination. Once
all the packets forming a message arrive at the destination, they are recompiled into the original
message. Most modern Wide Area Network (WAN) protocols, including TCP/IP and Frame Relay are
based on packet-switching technologies.
***********************************************************************************
*
Copper-based Gigabit Ethernet is an ethernet standard that offers speeds up to 1 Gbps over a distance of
100 meters (328 feet). It utlizes CAT5/CAT5e cabling and RJ-45 connectors.
***********************************************************************************
*
Below are the distances supported by each Fiber based Network:
10Base-T - 328ft (100m)
10Base-FL - 6,562 feet (2km)
100Base-FX - 412m in half-duplex or 2000m in full duplex
1000Base-T - 100m
1000Base-CX - 25m
1000Base-LX - up to 5km
1000Base-SX - 275m with 62.5 MMF or up to 550m with 50 MMF cable
***********************************************************************************
*
The 100BASE-TX media system is based on specifications published in the ANSI TP-PMD physical
media standard. Since the ANSI TP-PMD specification provides for the use of either unshielded
twisted-pair or shielded twisted-pair cable, the 100BASE-TX system also does so.
A NIC operates at both the Physical and Data Link layers. A Bridge also operates at the Data Link
layer of the OSI model.
***********************************************************************************
*
Auto-Negotiation takes place using Fast Link Pulse signals. These signals are a modified version of
the Normal Link Pulse signals used for verifying link integrity, as defined in the original 10BASE-T
specifications.
***********************************************************************************
*
100BaseFX has a maximum segment length of 412 meters.
***********************************************************************************
*
1000BaseSX supports network segments up to 550 meters long.
***********************************************************************************
*
1000BaseCX specifies 150-ohm STP cabling up to 25 meters long.
***********************************************************************************
*
CHAP authentication protocol most commonly uses MD-5 encryption for security
***********************************************************************************
*
The Transport layer performs end-to-end flow control, data segmentation and reliability, and reliable
message delivery.
***********************************************************************************
*
The Application layer enables network services and integrates network functionality into the host OS.
***********************************************************************************
*
The Presentation layer is responsible for encrypting and compressing data.
***********************************************************************************
*
The Data-Link layer identifies physical network addresses (MAC) and controls how messages are
propagated.
The Appletalk protocol always assigns a unique host ID.
***********************************************************************************
*
The Appletalk protocol can be enabled on a TCP/IP network through encapsulation or tunneling.
***********************************************************************************
*
An IPv6 address can be 4 times larger than a IPv4 address, but if all optional headers are left off, will
only be twice as large.
***********************************************************************************
*
Tunneling will allow a IPv6 address to be encapsulated into an IPv4 address.
***********************************************************************************
*

You might also like