Module 1 Flashcards

(30 cards)

1
Q

Protocol for POP3

A

The email is downloaded to the client computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Imap protocol

A

The client application manages the email while its stored on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RDP protocol

A

The Windows Remote Desktop application utilizes this protocol to provide secure, encrypted transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SNMP

A

This protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SMTP

A

This protocol is used to send mail messages to a mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The TCP and UDP protocols both exist at what layer of the OSI model?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At what layer of the OSI model do the IP, ICMP, and IGMP protocols operate?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using a Windows domain, what is the domain-level account for each user known as?

A

Global account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs.
What is another name for this address?

A

Mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When creating network diagrams, what icon description typically represents a network router?

A

An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When is it appropriate to utilize the NAT network connection type?

A

Whenever the VM does not need to be access at a known address by other network nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node

A

Ip addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

A

Fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an example of encapsulation?

A

The addition of a header to the data inherited from the layer above in the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTP, IMAP4,FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

A

HTTP, TCP, IP, Ethernet

17
Q

What accurately reflects what occurs when a message is too large to transport on a network?

A

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

18
Q

At what layer of the OSI model does a network switch normally operate?

19
Q

What type of network traffic requires QOS

A

Virtual classroom

20
Q

What is correct about network protocols?

A

They define how messages are exchanged between the source and the destination.

21
Q

Which PDU format is used when bits are received from the network medium by the NIC of a host?

22
Q

The difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

23
Q

A Switch (virtual switch) or bridge is a logically defined device that operates at both datalink and physical layer of the OSI model?

24
Q

Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple

25
The Transport layer header addresses a receiving application by a number called a MAC address.
False
26
The Network layer header identifies sending and receiving hosts by their
Ip addresses
27
In __________ network connection type, a vNIC relies on the host machine to act as a NAT device.
NAT, NAT mode
28
What statements describe an intermediary device
- they connect individual hosts to the network - they direct the path of data
29
30