Domain 1: Networking Concepts Flashcards
Which of the following technologies associated with the Internet of Things (IoT) is often used to identify pets using embedded chips?
A. Z-wave
B. Bluetooth
C. NFC
D. RFID
D. RFID
Radio-frequency identification (RFID) uses tags containing data, frequently embedded in pets, which can be read using electromagnetic fields. Z-wave is a short-range wireless technology, frequently used for home automation. Bluetooth is a short-range wireless protocol, frequently used for computer peripherals and personal area networks (PANs). Near-field communication (NFC) provides wireless communication over ranges of 4 cm or less, and it is often used for payment systems.
How many bits are allocated to the host identifier in an IPv4 address on the 10.72.0.0/17 network?
A. 8
B. 15
C. 16
D. 17
B. 15
The value after the slash in a classless inter-domain routing (CIDR) address specifies the number of bits in the network identifier. An IP address has 32 bits, so if 17 bits are allocated to the network identifier, 15 bits are left for the host identifier.
Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?
A. DHCP
B. BOOTP
C. DNS
D. SNMP
C. DNS
The Domain Name System (DNS) is a protocol that computers on a TCP/IP network use to resolve host and domain names into the IP addresses they need to communicate. Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) are both IP address allocation protocols, and Simple Network Management Protocol (SNMP) carries information gathered by agents to a central management console.
The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?
A. 25
B. 80
C. 110
D. 443
D. 443
The well-known port for HTTPS is 443. Port 25 is for the Simple Mail Transfer Protocol (SMTP), port 80 is for unsecured HTTP, and port 110 is for the Post Office Protocol (POP3)
Which of the following topologies requires the installation of terminating resistors at two locations?
A. Bus
B. Star
C. Ring
D. Mesh
A. Bus
A bus topology requires terminating resistors at each end of the bus, to remove signals as they reach the end of the cable and prevent them from reflecting back in the other direction and interfering with newly transmitted signals.
Which of the following is typically not an example of the Internet of Things (IoT)?
A. A key fob that unlocks your car
B. A smartphone home automation app
C. A remotely monitored cardiac pacemaker
D. A seismic early warning system
A. A key fob that unlocks your car
A key fob that unlocks your car is typically a short-range radio or infrared (IR) device that does not use the Internet for its communications. Each of the other examples describes a device with an IP address that uses the Internet to communicate with a controller or monitoring station.
Which of the following options should you configure on a Dynamic Host Configuration Protocol (DHCP) server to supply clients with a default gateway address?
A. Router
B. Time Server
C. Name Server
D. LPR Server
A. Router
The Router option specifies the addresses of routers on the local network, including the default gateway router. The Time Server option specifies the addresses of servers providing time signals to the network. The Name Server option specifies the addresses of up to ten name resolution servers (other than DNS servers) on the network. The LPR Server option specifies the addresses of line printer servers on the network.
Which of the following TCP/IP routing protocols measures the efficiency of routes by the number of hops between the source and the destination?
A. Routing Information Protocol (RIP)
B. Open Shortest Path First (OSPF)
C. Border Gateway Protocol (BGP)
D. Intermediate System to Intermediate System (IS-IS)
A. Routing Information Protocol (RIP)
RIP is a distance vector protocol, which uses hop counts to measure the efficiency of routes. OSPF, BGP, and IS-IS are all link state protocols, which do not rely on hop counts.
How do wireless networking devices conforming to the IEEE 802.11n and 802.11ac standards achieve transmission speeds greater than 72.2 Mbps?
A. By using direct sequence spread spectrum (DSSS) modulation
B. By using multiple antennae to transmit several data streams simultaneously
C. By using frequencies in the 5 GHz band
D. By sacrificing transmission range for speed
B. By using multiple antennae to transmit several data streams simultaneously
The IEEE 802.11n and 802.11ac standards support a transmission technique called multiple input and multiple output (MIMO), which combines the bandwidth of multiple data streams to achieve greater throughput. IEEE 802.11n and 802.11ac do use the 5 GHz band, but this in itself does not yield greater transmission speeds. The specified standards do not call for the use of DSSS modulation, nor do they sacrifice range for speed. In fact, 802.11n and 802.11ac networks can achieve greater ranges than the previous technologies.
Which of the following is the default subnet mask for an IPv4 Class A network?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
A. 255.0.0.0
A Class A address uses only the first octet as the network identifier, which yields a binary subnet mask of 11111111 00000000 00000000 00000000. In decimal form, the subnet mask is 255.0.0.0. The 255.255.0.0 mask is for Class B addresses, and 255.255.255.0 is for Class C addresses. Option D, 255.255.255.255, is the broadcast address for the current network.
Which of the following features is supported by DHCP, but not by BOOTP and RARP?
A. Dynamic address allocation
B. Relay agents
C. Manual address allocation
D. Automatic address allocation
A. Dynamic address allocation
Dynamic Host Configuration Protocol (DHCP) can dynamically allocate IP address to clients and reclaim them when their leases expire. Bootstrap Protocol (BOOTP) and Reverse Address Resolution Protocol (RARP) can allocate addresses automatically or manually, but they cannot reclaim them. DHCP and BOOTP both support relay agents.
Which of the following DHCP address allocation methods enables the server to reclaim IP addresses when they are no longer in use by clients?
A. Automatic
B. Dynamic
C. Manual
D. Static
B. Dynamic
Dynamic allocation enables a Dynamic Host Configuration Protocol (DHCP) server to lease IP addresses to clients for a specific time interval. When the lease period expires, the client can renew it, if it is still using the address. If the address is no longer in use when the lease expires, it is returned to the scope for reallocation. Automatic allocation permanently assigns an IP address from the scope to a client. Manual and static allocation are two terms describing the allocation of a specific IP address to a specific client.
Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?
A. 110 and 25
B. 143 and 25
C. 110 and 143
D. 80 and 110
E. 25 and 80
A. 110 and 25
The default port for the Post Office Protocol (POP3) is 110. The default port for the Simple Mail Transfer Protocol (SMTP), the other protocol used by email clients, is 25. Port 143 is the default for the Internet Message Access Protocol (IMAP), a different email mailbox protocol that clients never use with POP3. Port 80 is the default for the Hypertext Transfer Protocol (HTTP), which is not used by email clients.
Which of the following components does the port number in a transport layer protocol header identify?
A. A transport layer protocol
B. An application
C. A gateway
D. A proxy server
B. An application
The port numbers specified in a transport layer protocol header identify the application that generated the data in the packet or the application that will receive the data. Port numbers do not identify transport layer protocols, gateways, or proxy servers.
Which of the following is an example of a circuit-switched network connection, as opposed to a packet-switched network connection?
A. Two wireless computers using an ad hoc topology
B. A landline voice telephone call
C. A smartphone connecting to a cellular tower
D. Computers connected by a wired LAN
B. A landline voice telephone call
A circuit switched network connection requires a dedicated physical connection between the communicating devices. In a landline telephone call, a dedicated circuit is established between the two callers, which remains in place for the entire duration of the call. Wireless computers in an ad hoc topology and computers connected to a wired LAN use packet switching instead. A smartphone connection uses cell switching.
A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages?
A. SYN, ACK, SYN, ACK
B. SYN, SYN, ACK, ACK
C. SYN/ACK, SYN/ACK
D. SYN, SYN/ACK, ACK
D. SYN, SYN/ACK, ACK
The TCP connection establishment exchange is a three-way handshake. The first frame contains a SYN message from the client, the second frame contains a SYN/ACK message from the server, and the last frame contains an ACK message from the client.
Each of the following Carrier Sense Multiple Access with Collision Detection (CSMA/CD) events occurs on an Ethernet network when two stations transmit simultaneously, although not in the order listed. Which of the following events occurs immediately after the collision?
A. The two stations observe a random back-off interval.
B. The two stations transmit a jam signal.
C. The two stations stop transmitting.
D. The two stations listen to see if the channel is idle.
E. The two stations begin retransmitting their frames.
C. The two stations stop transmitting.
Stations on a CSMA/CD network first check the medium to see if it’s idle. If they detect an idle medium, they begin transmitting. If two or more devices transmit at the same time, a collision occurs. Immediately after a collision occurs, the two stations involved stop transmitting and then send out a jam signal. Then, the two stations back off for a random interval, and the transmission process begins again.
Which of the following IEEE 802.11 wireless LAN standards are capable of supporting both the 2.4 GHz and 5 GHz frequencies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
E. 802.11ac
D. 802.11n
Only the 802.11n standard defines wireless LAN devices that can support both 2.4 GHz and 5 GHz frequencies. The 802.11a and 802.11ac standards use only 5 GHz, and the 802.11b and 802.11g standards use only 2.4 GHz
Which of the following statements about a wired local area network (LAN) is true?
A. Wired LANs support only the star topology.
B. Wired LANs support only the star and bus topologies.
C. Wired LANs support only the star and ring topologies.
D. Wired LANs can support ring, bus, or star topologies.
D. Wired LANs can support ring, bus, or star topologies.
A wired LAN is a group of computers within a small area, connected by a common network medium. A wired LAN can be configured using a ring, bus, or star topology.
Which of the following Domain Name System (DNS) resource record types specifies the IP addresses of the authoritative DNS servers for a particular zone?
A. NS
B. PTR
C. MX
D. SRV
A. NS
The Name Server (NS) resource record identifies the authoritative servers for a particular DNS zone. Pointer (PTR) resource records are used to resolve IP addresses into hostnames. Mail Exchange (MX) records identify the mail servers for a particular domain. Service Locator (SRV) records identify the designated servers for a particular application.
Which of the following is a cellular communication technology that is virtually obsolete in the United States?
A. GSM
B. CDMA
C. CSMA/CD
D. TDMA
D. TDMA
Time Division Multiple Access (TDMA) is a communication technique that splits a frequency into multiple time slots, enabling it to carry multiple data streams. Commonly used in 2G cellular systems, the major U.S. carriers no longer use it in their 3G systems. Code Division Multiple Access (CDMA) and Global System for Mobile Communication (GSM) are alternative communications techniques that are currently used by the major U.S. cellular carriers. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a media access control method used by Ethernet networks; it is not a cellular communication technology.
Which of the following protocols is limited to use on the local subnet only?
A. Address Resolution Protocol (ARP)
B. Dynamic Host Configuration Protocol (DHCP)
C. Domain Name System (DNS)
D. Simple Mail Transfer Protocol (SMTP)
A. Address Resolution Protocol (ARP)
ARP relies on broadcast transmissions, which are not routable. It is therefore limited to use on the local subnet. DHCP also relies on broadcasts, but the ability to create DHCP relay agents makes it usable on an entire internetwork. DNS and SMTP do not rely on broadcasts and are therefore not limited to the local subnet.
Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?
A. RIP
B. STP
C. VLAN
D. NAT
B. STP
The Spanning Tree Protocol (STP) prevents packets from endlessly looping from switch to switch due to redundant links. Creating redundant links is a good preventive against switch failure, but packets transmitted over multiple links can circulate from switch to switch infinitely. STP creates a database of switching links and shuts down the redundant ones until they are needed. Routing Information Protocol (RIP) propagates routing table information. A virtual local area network (VLAN) is an organizational tool that operates within switches by creating multiple broadcast domains. Network Address Translation (NAT) is a routing method that enables private networks to share registered IP addresses.
Ralph has been instructed to use the network address 10.12.0.0/14 for the new network he is installing. What subnet mask value should he use when configuring his computers?
A. 255.248.0.0
B. 255.252.0.0
C. 255.254.0.0
D. 255.255.248.0
E. 255.255.252.0
F. 255.255.254.0
B. 255.252.0.0
The 14-bit prefix indicated in the network address will result in a mask with 14 ones followed by 18 zeroes. Broken into 8-bit blocks, the binary mask value is as follows:
11111111 11111100 00000000 00000000
Converted into decimal values, this results in a subnet mask value of 255.252.0.0.