Chapter 1 Flashcards

1
Q

Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Static electricity is an electrical charge in motion.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The protocol data unit for the Physical layer of the OSI model is payload, or data.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Data Link layer attaches a trailer to the end of a packet, and does not include a header.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Transport layer header addresses a receiving application by a number called a MAC address.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

A. Layer 7
B. Layer 6
C. Layer 5
D. Layer 4

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layer of the OSI model describes how data between applications is synced and recovered if messages don’t arrive intact at the receiving application?

A. Transport Layer
B. Application Layer
C. Presentation Layer
D. Session Layer

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Data Link Layer utilizes what name for its protocol data unit (PDU)?

A. data
B. bit
C. packet
D. frame

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What statement accurately reflects what occurs when a message is too large to transport on a network?

A. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
B. The message is sent anyway, and is received by the destination as garbage data.
C. An ICMP error is generated, and the application must reformat the data for transmission.
D. The message is discarded and must be sent again.

A

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a defining characteristic of a bus topology based network?

A. Devices are daisy-chained together in a single line.
B. Devices are directly attached to a network router, which forwards data to intended destinations.
C. Devices are connected directly to a centralized networking device, known as a network switch.
D. Devices are connected to two adjacent devices, and communication priority is granted by a token

A

Devices are daisy-chained together in a single line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?
A. star topology
B. star bus topology
C. bus topology
D. mesh topology
A

star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?
A. Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
B. Toxic Chemical Safety Procedure (TCSP)
C. Material Safety Data Sheet (MSDS)
D. Environmental Chemical Hazard Sheet (ECHS)

A

Material Safety Data Sheet (MSDS)

18
Q
A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?
 A. fail-oriented
 B. fail-close
 C.  fail-open
 D. fail-tolerant
A

fail-open

19
Q
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?
A. fail-close
B. fail-dynamic
C. fail-tolerant
D. fail-open
A

fail-close

20
Q
At what layer of the OSI model does a network switch normally operate?
A. Layer 3
B. Layer 4
C. Layer 2
D. Layer 5
A

Layer 2

21
Q

Which of the following is not one of the disadvantages of peer-to-peer networks?
A. They are impractical for connecting large numbers of computers.
B. They lack scalability.
C. They centralize user account logins.
D. They are not necessarily secure.

A

They centralize user account logins.

22
Q
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
A. Transport
B. Application
C. Session
D. Network
A

Network

23
Q

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?
A. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don’t arrive intact at the receiving application.
B. The Presentation layer is responsible for transporting Application layer payloads from one application to another.
C. The Presentation layer describes the interface between two applications, each on separate computers.
D. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

A

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

24
Q

Which of the following is an example of encapsulation?
A. The addition of a header to data inherited from the layer above in the OSI model.
B. The addition of a trailer to data inherited from the layer above in the OSI model.
C. The modification of headers from a higher layer in the OSI model.
D. The subtraction of a header from data inherited from the layer below in the OSI model.

A

The addition of a header to data inherited from the layer above in the OSI model.

25
Q
What mail protocol is used to send mail messages to a server?
A. POP3
B. IMAP4
C. HTTPS
D. SMTP
A

SMTP

26
Q

What is the most popular web server application?
A. Apache
B. NGINX
C. Microsoft Internet Information Services
D. Lighttpd

A

Apache

27
Q
The TCP and UDP protocols both exist at what layer of the OSI model?
A. Application
B. Network
C. Presentation
D. Transport
A

Transport

28
Q
The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?
A. DAC (Digital Access Control) address
B. DAC (Data Access Control) address
C. PAC (Packet Access Control) address
D. MAC (Media Access Control) address
A

MAC (Media Access Control) address

29
Q
In the TCP/IP model, what layer is considered so simple that it is ignored entirely?
 A. Data Link
 B. Physical
 C. Network
 D. Application
A

Physical

30
Q

What federal agency is charged with safety and health in the workplace?
A. Hazardous Materials and Safety Management (HMSM)
B. Workplace Safety and Hazard Administration (WSHA)
C. Office Safety and Standards Department (OSSD)
D. Occupational Safety and Health Administration (OSHA)

A

Occupational Safety and Health Administration (OSHA)

31
Q
What is the minimal amount of voltage required to damage an electrical component?
A. 1500 volts
B. 5 volts
C. 10 volts
D. 100 volts
A

10 volts

32
Q
When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors?
A. catastrophic failure
B. upset failure
C. interrupting failure
D. temporary failure
A

upset failure

33
Q
In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?
A. Transport
B. Application
C. Internet
D. Link
A

Application

34
Q

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?
A. The packet will be dropped silently, requiring the communicating application try again.
B. The packet will be divided into smaller packets using fragmentation.
C. The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed.
D. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination.

A

The packet will be divided into smaller packets using fragmentation.

35
Q
In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire?
A. extinguishing medium
B. eliminating factor
C. fire extinction agent
D. fire suppression agent
A

fire suppression agent

36
Q
In the United States, who is able to activate the Emergency Alert System at the national level?
A. The President
B. Any U.S. state or territory
C. The Federal Bureau of Investigation
D. Local law enforcement
A

The President

37
Q
What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?
A. port address
B. autonomous system address
C. MAC address
D. IP address
A

IP address

38
Q
What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?
A. HTTP
B. SNMP
C. SMTP
D. POP3
A

SNMP

39
Q
The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?
A. Remote Desktop Protocol (RDP)
B. File Transfer Protocol (FTP)
C. Secure Shell (SSH)
D. Secure Sockets Layer (SSL)
A

Remote Desktop Protocol (RDP)

40
Q

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?
A. Active Directory Domain Services (AD DS)
B. Active Directory Federated Users (AD FU)
C. Automated Directory Network Services (AD NS)
D. Windows Named Resource Services (WN RS)

A

Active Directory Domain Services (AD DS)