Fill in the Blanks of Troubleshooting Networks

troubleshooting networks fill in the blanks techhyme

The term networking describes a vast field of study, far too large for any single certification, book or training course to cover. If you’re considering any Network related certification, you probably don’t yet know exactly what aspect of networking you want to pursue.

You can easily test your networking knowledge by answering the below set of sentences in the form of fill in the blanks.

  1. The ____________ is an example of software that creates packets for moving data across networks.
  2. Most often, the ____________ provides the physical connection between the PC and the network.
  3. Using the ____________ enables a computer to send a packet that every other PC on the network will process.
  4. You can connect two very different networks by using a(n) ____________ .
  5. Every NIC has a hard-coded identifier called a(n) ____________ .
  6. The ____________ provides an excellent tool for conceptualizing how a network works.
  7. On a sending machine, data gets broken up at the ____________ of the OSI seven-layer model.
  8. NICs encapsulate data into a(n) ____________ for sending that data over a network.
  9. A (n) ____________ enables multiple machines to connect over a network.
  10. The ____________ provides the key interface between the Physical and Network layers.
  11. The ____________ is a network topology that relies on a main line of network cabling,normally coaxial cable.
  12. The ____________ of a cable will determine its speed.
  13. A(n) ____________ provides more fault tolerance than any other basic network topology.
  14. When your network has all computers connected to a centrally located wiring closet, you have a physical ____________ network.
  15. ____________ networks use more than one type of basic network topology.
  16. CAT 5e cable is a type of ____________ wiring.
  17. Coaxial cable uses a braided metal shield to protect data from ____________ .
  18. Network cabling can use either light or electricity to transmit data. The faster of these types uses light along ____________ .
  19. ____________ grade UTP must be installed in ceilings, while ____________-grade UTP is often used to connect one floor to another vertically in a building.
  20. The twisting of the cables in UTP and STP reduces ____________ .
  21. The ____________ is unique to each individual NIC.
  22. When extra “filler” data is needed in a packet, a(n) ____________ is added.
  23. Another name for a packet is a(n) ____________ .
  24. A NIC that is listening for all packets sent along the wire is said to be in ____________.
  25. The first item in a data packet is the ____________ .
  26. A hub acts as a(n) ____________ in that it copies all incoming signals to every connected port.
  27. Connecting switches incorrectly can create a(n) ____________ which can make the whole network stop working.
  28. Hubs can be daisy-chained through their ____________ or the use of a(n) ____________ .
  29.  ____________ has a maximum distance between node and hub of 100 meters while ____________ has a maximum distance of 2000 meters.
  30. A(n) ____________ can be used to interconnect different Ethernet types.
  31. When a network device can both send and receive data at the same it is said to be ____________ .
  32. ____________ has a maximum cable length of two kilometers and uses multi mode fiber with ST or SC connectors.
  33. 100Base T is also known as ____________ .
  34. ____________ can use CAT 3 but ____________ must use CAT 5 or better.
  35. 802.3z and 802.3ab are both ____________ standards.
  36. ____________ supports the longest maximum distance for 10-Gigabit Ethernet.
  37. The ____________ and ____________ IEEE standards support the longest maximum distance for 10-Gigabit Ethernet.
  38. Many fiber experts consider the ____________ connector to be the predominant fiber connector.
  39. ____________ is the cheapest and most popular 10-GbE media type.
  40. Routers with ____________ can accept a variety of 10-GbE media types.
  41. All the cabling from individual  work  areas runs via ____________ to a central location.
  42. The central location  that all cabling runs to is called the ____________ .
  43. A single piece of installed horizontal cabling is called a(n) ____________ .
  44. The set of standards established by the EIA/TIA regarding network cabling is called ____________ .
  45. You use a(n) ____________ to connect a strand of UTP to a 110 block or 66 block.
  46. A short UTP cable that uses stranded, rather than solid, cable is called a(n) ____________ and can tolerate much more handling near a patch panel.
  47. The type of network interface unit (NIU) that enables an ISP or telephone company to determine if a home DSL, box or cable router has been disconnected is called a(n) ____________ .
  48. The spot where a cable comes out of the wall at the workstation is called a (n) ____________ .
  49. The height measurement known as U is used for devices that fit into a(n) ____________ .
  50. The term ____________ describes the process of a signal weakening as it progressed down a piece of wire.
  51. The ____________ portion of an IP address resembles
  52. The ____________ portion of an IP address consists of from one to three octets, with the final octet between 1 and 254.
  53. The single organization that distributes IP addresses is called the ____________ .
  54. The IP address is a valid ____________ address.
  55. The command ____________ is a program that comes with Microsoft Windows to show TCP/IP settings.
  56. The command ____________ is a program for UNIX/Linux/Macintosh used to show TCP/IP settings.
  57. The ____________ protocol is used to translate MAC addresses to IP addresses.
  58. Computers set for dynamic addressing that cannot locate a DHCP server use——- to assign themselves an IP address.
  59. The ____________ is the IP address of the router.
  60. The ____________ is a 32-bit binary number common to all computers on a network used to determine to which network a computer belongs.
  61. A device called a(n) ____________ is also called a Layer 3 switch.
  62. The external routing protocol used on the Internet is ____________ .
  63. The variety of ____________ methods would include RIP, OSPF, BGP, and IGRP.
  64. A(n) ____________ is normally entered manually into a router.
  65. A(n) ____________ connects one Autonomous System to another Autonomous System.
  66. ____________ is a routing protocol that updates routing tables about every 30 seconds, resulting in overloaded network traffic.
  67. When all routers can communicate with each other efficiently, they are said to have reached ____________ .
  68. Multiple networks that do not use IP addresses and are governed by a single protocol are known as ____________ .
  69. You can use the ____________ utility to troubleshoot routing problems.
  70. A(n) ____________ is an arbitrary number generated by the sending computer that enables the receiving computer to know what application to use for the returning packet.
  71. The TCP port numbers ranging from 0-1023 are called ____________ .
  72. The TCP port numbers ranging from 1024-49151 are called ____________ .
  73. The protocol used to transmit large files over the Web using both ports 20 and 21 is called ____________ .
  74. The protocol that is not as popular as POP3 for receiving e-mail is ____________ .
  75. Port 23 is used by ____________ to emulate terminals on TCP/IP networks.
  76. When you send out an e-mail message it uses ____________ .
  77. The quickest way to send to a few co-workers information about an upcoming meeting would be to send a(n) ____________ .
  78. The ____________ utility can be used to view the endpoints of your computer’s sessions.
  79. Telnet has largely been replaced by ____________ which provides better security through data encryption.
  80. TCP is ____________ in that it requires computers to acknowledge each other; while UDP is ____________ in that it provides no guarantee packets were successfully received .
  81. The ____________ command is used to establish connectivity.
  82. Using ____________ alone can help determine whether a WINS server has supplied inaccurate address to a particular WINS client.
  83. The term ____________ refers to networks that use DNS belonging to the same DNS system.
  84. A helpful command that displays TCP/IP naming information is ____________ .
  85. ___________ is responsible for resolving NetBIOS names to IP addresses on predominately Windows networks.
  86. To connect to systems on the Internet, your network needs the name of at least one ____________ .
  87. To forward WINS broadcasts to a WINS server on the other side of the router, you need to set up a(n) ____________ .
  88. You can use the diagnostic utility called ____________ to trace the progress of a ping packet between your system and a remote computer.
  89. To avoid having to re-resolve an FQDN that it has already checked, a Windows DNS server keeps a list of IP addresses it has already resolved, called ____________ .
  90. This single DNS server that has a list of all the host names on the domain and their corresponding IP addresses is the ____________ .
  91. ____________ defines what a person accessing data can do with that data.
  92. ____________ is the act of verifying you are who you say you are.
  93. ____________ is the process of guaranteeing that data is as originally sent and that it came from the source from which you think it should have come.
  94. A(n) ____________ encrypts data in fixed-length chunks at a time.
  95. ____________ is a secure replacement for Telnet.
  96. A(n) ____________ uses one key to encrypt data and a different key to decrypt the same data.
  97. SSL has been replaced by the more robust ____________ .
  98. SCP has been replaced by ____________ a secure protocol for copying files to a server.
  99. ____________ is the default authentication protocol for Windows domains and is extremely time sensitive.
  100. ____________ uses a 128-bit block, up to a 256-bit key, and is a virtually uncrackable encryption algorithm.
  101. ____________ is Cisco’s VPN protocol that relies on IPSec for all its security needs.
  102. In a(n) ____________ network, all computers can act in dual roles as clients or servers.
  103. A(n) ____________ services client requests and forwards them to the appropriate server.
  104. In a(n) ____________ network, client computers cannot share resources with each other or see each other. They can only connect to a server.
  105. ____________ allows a VLAN to be defined across multiple switches.
  106. Routers that enable you to set QoS often use ____________ to limit the amount of bandwidth used by certain devices or applications.
  107. Creating a(n) ____________ helps to reduce broadcast traffic on any one network by separating the one large network into smaller ones, but requires the use of a special switch.
  108. A(n) ____________ is a network created by a secure tunnel from one network to another remote network.
  109. ____________ is a special program running on Microsoft servers that enables remote users to connect to a local Microsoft network.
  110. Microsoft’s ____________ enables computers on one end of a VPN to receive an IP address on the subnet of the remote network.
  111. A(n) ____________ DHCPv6 server passes out only optional information.
  112. The ____________ tunneling protocol is the only one that doesn’t use a tunnel broker.
  113. It is the practice of ____________ that greatly reduces the size of IPv6 routing tables by reducing them to a subnet of an upstream router.
  114. You must have a(n) ____________ to connect to the IPv6 Internet.
  115. A(n) ____________ address contains a total of 32bits.
  116. A packet sent to a (n) ____________ is broadcast to all network nodes, but only the target nodes read the packet.
  117. The MAC address is used to generate the complete ____________ except in Windows Vista and Windows 7.
  118. The ____________ appends an IPv4 address to the end of the IPv6 prefix.
  119. Computers involved in a local network that has no Internet connectivity require only a(n) ____________ .
  120. Employing the services of a(n) ____________ automates the process of setting up an IPv6 tunnel.
  121. A(n) ____________ line has a maximum throughput of 1.544 Mbps.
  122. A(n) ____________ is a device that converts signals between analog and digital.
  123. It is the job of the ____________ to convert between 8-bit-wide digital data and single-bit-wide digital data.
  124. A(n)____________signal is defined as a digital signal of 64 Kbps.
  125. A(n) ____________ combines individual circuits with hundreds of others, creating a complex circuit on a single wire.
  126. ____________ is the primary standard in the United States for long-distance, high-speed, fiber optic transmission systems.
  127. In the world of DSL, ____________ provides equal upload and download speeds up to 15 Mbps.
  128. ____________ uses an IP network to transfer voice calls.
  129. ____________ lines consist of two digital channels over the same copper wire used by regular analog telephones.
  130. ____________ is a router feature that can help to optimize network traffic by labeling certain data to use a desired connection.
  131. Use ____________ to locate a problem between two routers.
  132. Use a(n) ____________ to put wires into 66-and 110-blocks.
  133. A(n) ____________ tests cables to ensure they can handle their rated capacity.
  134. If ICMP packets are being blocked, you can use ____________ to test connectivity to another system.
  135. ____________ is a popular packet sniffer/protocol analyzer/packet analyzer.
  136. To view IP settings on a UNIX computer, use the ____________ command.
  137. Use a(n) ____________ to test AC/DC voltage, resistance, and continuity.
  138. ____________ is similar to NSLOOKUP, but much more powerful.
  139. ____________ uses ICMP packets to test connectivity between two systems.
  140. A(n) ____________ is used by telephone technicians to tap into a 66-or 110-block to determine if a particular line is working.
  141. When a network uses the 802.11 standard it is said to be a(n) ____________ .
  142. Establishing a unique ____________ or network name helps ensure that only wireless network devices configured similarly are permitted access to the network.
  143. To connect wireless network segments together, you should use a(n) ____________ .
  144. ____________ wireless bridges are used to connect only two wireless network segments together, because they can only communicate with a single other bridge.
  145. ____________ wireless bridges are used to connect multiple network segments together, because they can talk to more than one other bridge at a time.
  146. Of the two wireless encryption protocols, ____________ is less secure.
  147. Of the two different spread-spectrum broadcasting methods, ____________ sends data out on different frequencies at the same time, and therefore uses considerably more bandwidth.
  148. WPA uses ____________ to encrypt data while WPA2 uses the more secure___________ .
  149.  ____________ allows devices on 802.11n networks to make multiple simultaneous connections, allowing for a theoretical throughput of 600 Mbps.
  150. 802.11 implements ____________ which proactively avoids network packet collisions rather than simply detecting them when they occur.
  151. Bogus e-mails trying to trick you into revealing information constitute ____________ attacks.
  152. ____________ is when you separate and either allow or deny access based only on the packet type being sent.
  153. A(n) ____________ is either hardware or software that protects a network from threats by using a variety of methods.
  154. When your network blocks out traffic based on port number, you are using ____________ .
  155. The Microsoft Windows XP (service Pack 2 and later) operating system includes a built in feature called ____________ to protect from network threats.
  156. The infamous “smurf attack” is a classic ____________ .
  157. Many IT professionals are surprised when they first learn that the majority of network threats are ____________ .
  158. The____________ is when a network administrator has set up perimeter defense using two routers on the outer edge of your corporate network between your firewall and the Internet.
  159. ____________ hides your private network’s IP addresses from the Internet.
  160. A(n) ____________ makes copies of itself across hard drives, but not across a network.
  161. The best Windows software tool to use when trying to establish baselines is ____________ .
  162. A(n) ____________ shows all the wiring in a building, often including the telephone system, and is kept by the people in charge of the building.
  163. The ____________ tracks successful and failed logons and logoffs.
  164. When network resources are always ready whenever a client requests them, they are said to have ____________ .
  165. A(n) ____________ provides long-term power in the event of an extended blackout.
  166. A(n) ____________ shows the broadcast domains and individual IP addresses for all the devices in your network.
  167. A(n) ____________ shows cabling runs and the type of connection in addition to showing every router, switch, and server and their makes, models, and firmware versions.
  168. A(n) ____________ provides short-term power in the event of a brownout.
  169. A(n) ____________ copies only the files that have been changed since the last backup. This backup turns off the archive bits.
  170. A(n) ____________ defines exactly what you can and cannot do with your computers and network.

Now that you have a feel for how long it’s going to answer, you need a strategy for studying. If you have any problems or questions, or if you just want to argue about something, feel free to send an e-mail to us at

You may also like:

Related Posts

Leave a Reply