Chapter 1 Flashcards
You have implemented a network where hosts are assigned specific roles, such as for file sharing and rpinting. Other hosts access those resources but do not host services of their own. What type of network do you have? A Internet B Peer-to-peer C Client/Server D Extranet
C Client/Server
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? A Polling B Peer-to-Peer C Mulitple access D Client/Server
B Peer-to-Peer
Which of the following topologies connects each network device to a central hub? A Ring B Bus C Mesh D Star
D Star
You have a small network that uses a hub to connect multiple devices. What physical topology is used? A Star B Mesh C Ring D Bus
D Star
In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? A Bus B Ring C Tree D Star
B Ring
You have been asked to implement a network infrastructure that will accomadate failed connections. Whcih of the following network topologies provides redundancy for a failed link? A Mesh B Bus C Ring D Star
A Mesh
You have a network that uses a logical rinf topology. How do messages travel through the network?
A Messages travel from one device tot he next until they reach the destination.
B Messages are sent to a central device which then forwards the message to the destination.
C Messages are sent directly to the destination.
D Messages are sent to all devices connected to the network.
A Messages travel from one device tot he next until they reach the destination.
Which of the following topologies connects all devioces to a trunk cable? A Tree B Bus C Ring D Star
B Bus
What device is used to create a physical star topology? A Bridge B Firewall C Router D Switch
D Switch
You have a network that uses a logical bus topology. How do messages travel through the network.
A Messages travel from one device to the next until they reach the destination device.
B Messages are sent directly to the correct destination device.
C Messages are broadcast to all devices connected to the network.
D Messages are sent to a central device which then forwards the message to the destination device.
C Messages are broadcast to all devices connected to the network.
You want to implement a fault tolerant topology as you interconnect routers on your wide area netowrk. Which of the following would meet your needs? A Bus B Ring C Mesh D Star
C Mesh
Which of the following topologies connects each device to a neighboring device? A Star B Tree C Ring D Bus
C Ring
You have implemented an ad-hoc wireless network that doesnt employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical topology has been implemented in this type of network? A Ring B Tree C Bus D Star E Mesh
E Mesh
What protocol sends email to a mail server? A SNMP B SMTP C POP3 D FTP E TFTP
B SMTP
You have a large TCP/IP network and want to keep hosts real time clocks syncronized. What protocol should you use? A NTP B SAP C SNMP D SMTP E NNTP
A NTP
Your company has just acquired another comapany in the same city. You are given the task of integrating the two email systems so that messages can be exchanged between the email servers. However, each network uses an email package froma different vendor.
Which TCP/IP protocol will enable messages to be exchanged between systems?
A FTP
B SMTP
C IMAP4
D ICMP
E POP3
B SMTP
Which protocol is used on the world wide web to transmit web pages to web browsers? A NNTP B HTTP C HTML D SMTP
B HTTP
You want to transfer a file from a Unix server to a windows 2000 computer. Which of the following utilities could you use to do this? Select all that apply. FTP Tracert Netstat NBSTAT Telnet TFTP
FTP
TFTP
You want to allow your users to download files form a server runing the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability? A HTML B TCP C FTP D HTTP E IP F TFTP
C FTP
Which of the following protocols stores email on the mail server and gives a choice to download mail or keep it on the server? A NTP B SMTP C POP3 D IMAP4
D IMAP4
Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server? A POP3 B SMTP C FTP D SPC E SNMP
A POP3
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? A TCP B ARP C ICMP D IGMP E DHCP F IP
C ICMP
You are asked to recommend an email retieval protocol for a company’s sales team. The sales team needs to access email from various locations and possibly different computers. the sales team does not want to worry about transferring email messages or files back and forth between these computers.
Which email protocol was designed for this purpose?
A SMTP
B POP4
C POP3
D MFTP
F IMAP
F IMAP
Internet Message Access Protocol
The data link layer of the OSI model is compromised of two sublayers. Waht are they? A LAT B DLC C MAC D SAN E LLC
C MAC
E LLC