Pass exam take two Flashcards

1
Q

What names pages on the web, gives location and how to access a web page?

A

Uniform Resource Locator(URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the OSI model, the hyperlink uses a(n) _____ to name the pages on the web.

  • Uniform Resource Locator
  • Session Initiation Protocol
  • Domain Name System
  • Open Systems Interconnection
A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the most accurate description of clients in client/server architecture?

  • Desktop computers with a wired connection and laptop computers with a wireless connection
  • All devices connected to a network
  • Hardware devices which provide end users with access to data and services on the server
  • Computers connected to a network used for downloading data from a server
A

Hardware devices which provide end users with access to data and services on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which layer is the application layer on the Open Systems Interconnect (OSI)?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which layer is the presentation layer on the Open Systems Interconnect (OSI)?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which layer is the session layer on the Open Systems Interconnect (OSI)?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which layer is the physical layer on the Open Systems Interconnect (OSI)?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which layer is the datalink layer on the Open Systems Interconnect (OSI)?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which layer is the transport layer on the Open Systems Interconnect (OSI)?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which layer is the network layer on the Open Systems Interconnect (OSI)?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which layer in the OSI model provides access to available network resources?

A

7 - Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which layer in the OSI model translates, encrypts and compresses data?

A

6 - Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which layer establishes, manages and terminates communicative sessions in the OSI model?

A

5 - Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which layer provides reliable proccess-to-process message delivery and error recovery in the OSI model?

A

4 - Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

moves packets from source to destination, by providing internetworking capabilities

A

3 - Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

organizes bits into frames providing node-to-node delivery

A

2 - Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

transmits bits over a medium, establishing mechanical and electrical specifications

A

1 - Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Open Systems Interconnect (OSI)

A

has seven layers that each perform a specific & supportive commincative task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

protocol

presentation layer

A

a standard set of guidelines under which the network operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Presentation Layer functions?

A
  • character-code translation
  • data conversion data compression
  • data encryption and decryption
  • data translation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Presentation layer sub layers?

A

CASE and SASE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

1- CASE

sublayer of presentation layer

A

Common Application Service Element
Provides application layer services and makes service requests of the session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2 - SASE

sublayer of presentation layer

A

Specific Application Service Element

provides application services/protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Networking

A

A grouping of two or more computers being linked together to exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Session Layer (4)

A

primary responsibilites of session layer protocols are to set up, control, maintain, and close communicative sessions.

Coordinate active applications on various hosts using assigned protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Network Basic Input/Output System (NETBIOS)

Common Session Layer API

A

allows applications on separate computers to communicate and establish sessions to access shared resourcs over a local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Transfer Control Protocol/Internet Protocol (TCP/IP)

Common Session/Transport Layer API

A

Standardizes communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Common Session Layer Protocols

Name 6

A
  1. Network File System (NFS)
  2. Structured Query Lanuguage (SQL)
  3. Remote Procedure Call (RPC)
  4. X Window System
  5. AppleTalk Session Protocol (ASP)
  6. DEC Session Control Protocol (SCP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does layer five of the OSI model do?
* Provides access to available network resources.
* Establishes, manages and terminates communicative sessions.
* Organizes bits into frames providing node-to-node delivery.
* Moves packets from source to destination providing internetworking capabilities.

A

Session Layer - Establishes, manages and terminates communicative sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The session layer provides communicative support to which two OSI layers?

  • Data link and transport
  • Application and physical
  • Presentation and transport
  • Network and application
A

Presentation and transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The API that allows applications on separate computers to communicate over a LAN is:
* IP
* NetBIOS
* TCP/IP
* TCP

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?

  • TCP/IP
  • IP/NetBIOS
  • OSI
  • NetBIOS
A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

the lowest layer in the OSI model and is used for transmitting data in its basic form: bit-level

A

Physical Layer (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Physical Layer transmission medium is______ or ______

A

wired or wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Physical Layer components in a wired model include ____

Physical Layer

A

bolts and connectors to carry data from one place to another by using (cables) electromagnetic signals that translates to a stream of bits

NIC - Network interface cards, connectors and interfaces and cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Physical Layer components in a wireless model include ____

Physical Layer

A

Cellular Wifi and bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Types of cables in networking

Physical Layer

A
  1. Coaxial
  2. Sheilded Twisted Pair
  3. Unsheilded Twisted Pair
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Shielded Twisted Pair (STP)

Physical Layer

A

foil shielding around pairs of twisted wires to prevent electromagnetic interfaces

Acts as a ground to the phone cable to carry data faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Unshielded Twisted Pair (UTP)

Physical Layer

A

made the same as a shielded twisted pair but without the extra foil shielding around the wire

Most popular commonly used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A networking cable that is a wire covered by alternative conducting and insulating shields (more reliable):

Physical Layer

A

Coaxial Cable

hooks up to modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

RJ-45

Physical Layer

A

8-wire connectors used specifically for connecting LAN or Ethernet cables

Most common UTP connector cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Fiber ST, SC

Physical Layer

A

fiber cable connectors that are always used in pairs; one wire is for transmitting data, and the other is for receiving it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

used for fiber optic cables and transmission of optical signals

Physical Layer

A

Fiber LC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Data transmitted in a single direction in the Physical Layer:

A

Simplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Half-duplex

Physical Layer

A

Data can be transmitted in both directions, but not at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Full-duplex

Physical Layer

A

Data can be transmitted in both directions at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which connector is NOT used in a network cable?

  • RJ-11
  • Fiber ST
  • RJ-45
  • Fiber LC

Physical Layer (1)

A

Rj-11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

An NIC is used for which of the following?

  • Connecting a telephone to the network.
  • Connecting a computer to a network.
  • Securing a computer in a network.
  • Using as a telephone wire.

Physical Layer (1)

A

Connecting a computer to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

In the OSI physical layer, data is transmitted in the form of _.
* optical signals

  • infrared rays
  • both optical and electromagnetic signals
  • electromagnetic signals
A

both optical and electromagnetic signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What does bandwidth mean?
* Bandwidth is the theoretical minimum speed of your data
* Bandwidth is the actual speed of your data
* Bandwidth is the theoretical maximum speed of your data
* Bandwidth does not apply to network speed

A

Bandwidth is the theoretical maximum speed of your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does throughput mean?
* Throughput is the slowest speed your data can travel on the network
* Throughput is the actual amount of data you get in a certain amount of time

  • Throughput is the delay between the moment you demand data and the time you eventually get it
  • Throughput is the fastest speed your data can travel on the network
A

Throughput is the actual amount of data you get in a certain amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of these statements is true?
* You should rarely expect delays when you ask for data
* Data always travels the same speed on the network
* You can expect to get just as much throughput as you ask for
* You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency

A

You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the 3 basic cable types in networking?

A
  1. Twisted pairs
  2. Coaxial
  3. Fiber optics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Twisted pair cable types (9)

Networking

A
  • Cat1 - Cat5
  • Cat5e
  • Cat6
  • CAt6a
  • Cat7
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Cat1 - Cat3

A

Not standard anymore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Cat4

A
  • Token ring networks
  • 16 mbps
  • range 100 meters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

CAT5

A
  • Ethernet-based Newtorks
  • Two twisted pairs
  • 100 Mbps
  • range up to 100 meters

Most common in homes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Cat 5e

A
  • Four twisted pairs over an ethernet connection
  • 1000 Mbps
  • up to 100 meters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cat6, Cat6a, cat7

A
  • four twisted pairs
  • future standard
  • 10 gbps
  • 100 meters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Fiber Optic Cables

A

the new network connection standard and are so fast that they can carry light speeds, thus allowing for gigabit networks

Over 1000 mbps

More secure than coaxial

thinner, faster, more bandwidth, stays cool, less interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Fiber Optic Cable Types

A
  1. Single - mode
  2. Multi - mode
  3. Plastic Optical Fiber
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Single-Mode (SMF)

A
  • used to transmit data over much longer distances than the other two types
  • high bandwidth/performance
  • lighter
  • less bulky
  • resistance to corrosion
  • more secure
  • immune to electromagnetic interference

from city to city

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
  • used for sending data over short distances
  • larger in diameter
  • less expensive
A

Multi-Mode (MMF)

office building floor to floor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Plastic Optical Fiber

A

consumer optical fiber cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

** Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?**

Unshielded twisted pair

Fiber optic

CAT2

Coaxial

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

** In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?**

CAT4

CAT5

CAT7

CAT5e

A

Cat5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is the main purpose of having a twisted pair cable?

To cut down on costs

To double the transfer rate of data

To make installation easier

To reduce electromagnetic interference from outside sources

A

To reduce electromagnetic interference from outside sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

When internet service providers use fiber optic cables, which cable type are they most likely to use for home networks?
Multi-mode

Plastic optical cable

Single-mode

None of these answer are correct

A

Plastic optical cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the main advantage of using a shielded twisted pair (STP) cable for a network connection?
To focus the network connection in a large room

To cut back on electrical interference

There is no advantage to using one

To enhance the network connection in a small room

A

To cut back on electrical interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

optical fiber

A

a very thin strand of plastic or glass that is used to transmit messages via light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The type of fiber used typically for long distance runs is:
Wave-division multiplexing fiber
Serial fiber
Multi-mode
Single-mode

A

Single-Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

An advantage of optical fiber over traditional copper wiring is:
Less bulk
Lower cost
You can pull it tighter
It can bend at greater angles than copper

A

Less bulk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

User Datagram Protocol (UDP)

A

David Reed with RFC 768
Speed over efficiency
Printers, streaming media, Larger files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

jenny.myconference.com which is the host name

A

jenny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

URL is an acronym for __________.
Uniform Reference Link

Unique Reference Link

Uniform Resource Locator

Unique Reference Location

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Access a website by entering the _____ or _____ into the address bar of the Internet browser.
host name, URL

domain name, URI

HTML, network

URL, IP address

A

URL, IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Domain Name System (DNS)

A
  • a unique string associated with an IP address
  • a network of directories on the internet used to resolve host names into machine-readable IP addresses

gingername.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Top name domain servers

A

.com
.org
.net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following statements is true?

Recursive name servers respond to queries from authoritative servers

Recursive name servers respond to queries from TLD name servers

Authoritative name servers respond to queries from recursive name servers

Local DNS cache respond to queries from root servers

A

Authoritative name servers respond to queries from recursive name servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

_____ is an example of a TLD name.

gingernameclub.com

www.gingernameclub.com

www.com

.com

A

www.gingernameclub.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

DNS servers use _____ servers to help resolve IP addresses to Domain Names

IP servers

Authentication servers

Caching servers

Authoritative servers

A

Authoritative servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which of the following statements is true when a user first makes a DNS query by typing the domain name into the web browser?

A DNS query answer is returned from the authoritative servers

A request is sent to the respective root nameservers

A request is sent to an ISP recursive server

The local DNS cache is queried

A

The local DNS cache is queried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Prefix identifies what 172.16.254.1

A

172.16. network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

IP address

A
  • unique identifier in the field of networking that identifies the physical coordinates of a device that is connected online
  • dotted-decimal notation
  • 32 bits total (1 byte = 8 bits)
  • 172.16.254.1 = 10101100.00010000.11111110.000000001
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Suffix identifies what 172.16.254.1

A

254.1 device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Routing class A

IP Addresses

A

0 - 127

examples 10.1.7.242, 10.253.20.17

For large number of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Routing class B

IP Addresses

A

128-191

172.16.47.18, 172.16.250.241

Medium Sized Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Routing class C

IP Addresses

A

192-223

192.16.1.1, 192.168.45.253

small networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Routing class D

IP Addresses

A

224-239

Multi-tasking

227.26.6.173

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Routing class E

IP Addresses

A

240-254

Research and develpment

243.164.89.28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

IPv4

A
  • more devices than addresses
  • finite number of addresses
  • solution non-routable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Network Address Translation (NAT)

IP addresses

A

is used to provide an alias for the device; the router translates that alias back to the device’s IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

internet service provider (ISP)

IPv6

A

gives your home location a physical IP address that can be traced back to your modem via coordinates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

IPv6 format

A
  • 128 bits (binary digits)
  • hexadecimal format and 0s 1s
  • 6e3d:e161:de2a:eb9e:28af:86bc:55a3:e5ce.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Fixed Header

IPv6

A
  • Source address
  • Destination address
  • Version/IP version
  • Traffic class
  • Flow label
  • Payload length
  • Next header
  • Hop limit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Source address

IPv6 Header

A

The original 128-bit source address for an IPv6 node packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Destination Address

Ipv6 Header

A

The 128-bit recipient address from the IPv6 node packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Version/IP version

IPv6 Header

A

The 4-bit identifier for the version that is being used, in the case of IPv6, that number is going to be 6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Traffic Class

Ipv6 Header

A

An 8-bit field that is used to determine a packet’s level of priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Flow Label

IPv6 Header

A

A 20-bit field for defining the packets of the flow. This is useful for the router to determine which packets belong to a particular flow of information. This is mainly used for multimedia or video communications etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Payload Length

IPv6 Header

A

A 16-bit field that states the overall length of a packet payload, which can go up to 64 kilobytes if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Next Header

IPv6 Header

A

This indicates the type of extension header (if exists) or the upper layer PDU (such as TCP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Hop Limit

IPv6 Header

A

An 8-bit field that discards the packet after an absolute limit of time has passed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

IPv6 Addressing types

IPv6

A
  • Unicast
  • Multicast
  • Anycast
  • Broadcast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Unicast

IPv6 Addressing Types

A

A packet is delivered only to one interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Multicast

IPv6 Addressing Types

A

A packet is delivered to multiple interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Anycast

IPv6 Addressing Types

A

A packet is delivered to one of the multiple interfaces, but only based on the nearest routing location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Broadcast

IPv6 Addressing Types

A

This is used in IPv4 to send a single packet to multiple hosts at once. IPv6 does not make use of this technology, making it an old address type not suitable for the future of networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Is a unique identifier assigned to a computer system (host) on a network with which it can be identified and accessed easily. Simply put, it is the computer system’s name or an alias or domain name.

A

Hostname

Hostname Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Host file

Hostname resolution

A

Exists in the ‘‘SYSTEM32\DRIVERS\ETC’’ directory under the Windows root directory (i.e., \WINDOWS or \WINNT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Hostname Resolution

A

Refers to the process through which an assigned hostname is converted or resolved to its mapped IP Address so that networked hosts can communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What protocol do computer systems (hosts) use when communicating with each other on a network?
OSI Models
URLs

IP Addresses
IP Servers

A

IP Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

How are hostnames resolved?
* Hostnames are resolved through an Internationally designated body saddled with the task.
* Hostnames are resolved locally and remotely on a servers.
* Hostnames are already in-built in the computer systems and hence are resolved on their own.
* Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.

A

Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q
  • Why is it necessary for computer systems (hosts) to have a hostname or domain name?
  • It is necessary because it is an international standard which must be followed.
  • It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
  • It is necessary because every device has a name and so this should not be different.
  • It is necessary because it differentiates it from other people’s computer systems.
A

It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What is a hostname or domain name used for?
* It is a name given to a website and the server.
* It is used for naming a device or computer system.
* It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.
* It is a security requirement.

A

It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What is Hostname Resolution?
* It is the process through which hostnames are reserved for use on another network.
* It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes.
* It is the process through which hosts on a network communicate with another.
* It is the process through which hostnames are separated from each other using a router.

A

It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

addresses work along with IP addresses on a network device for communication. The device must have the necessary functioning hardware to communicate on the network. With NIC

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

MAC address

A
  • NIC 48 bit numbers
  • The MAC address is a hardwired number, permanent and unique to a device’s NIC.
  • example 00-14-22-01-23-45
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

How does the MAC Address differ from an IP address?

  • The MAC address operates in the Network layer of the TCP/IP stack.
  • The MAC address is a hardwired number, permanent and unique to a device’s NIC.
  • The MAC address carries only network addressing information.
  • The MAC address is dynamically assigned each time a device establishes a new connection in a network.
A

The MAC address is a hardwired number, permanent and unique to a device’s NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

IP Addresses operate within the _ layer of the TCP/IP protocol.
Data Link Layer

Application Layer

Physical Layer

Network Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What is an IP address?

  • An IP (Internet Protocol) address is used to identify a computer.
  • An IP (Internet Protocol) address is used to identify a NIC.
  • An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment.
  • An IP (Internet Protocol) address is a series of hardwired numbers which is used to identify a network environment.
A

An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Which of the following statements is true?

  • NICs are hardwired with IP and MAC addresses.
  • MAC and IP addresses need to work in parallel for effective communication.
  • MAC and IP addresses can both work independently depending on the environment.
  • MAC addresses can route data packets over the internet independent of IP addresses.
A

MAC and IP addresses need to work in parallel for effective communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Why are addresses important in networking?

  • They identify the layers in the TCP/IP Stack.
  • They are used to reveal the name of the device.
  • They are used to identify both the network to which the device is connected to as well as the device itself.
  • They are used to establish the network layer of the operating environment.
A

They are used to identify both the network to which the device is connected to as well as the device itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

IPv4 (Internet Protocol version 4)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Advanced Research Project Agency or ARPA developed ARPANET

A

(later known as DARPA due to defense contracts) and began working on networking in the late ’60s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

The Network Control Protocol

A

which was the predecessor to TCP/IP v4, was created by ARPANET and first used in 1971.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

TCP/IP v4

A

was finalized in 1981 as part of RFC 791.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What is variable length subnet masking used for?

  • It allows an IP address space to be divided into subnets of different sizes.
  • It is used to introduce complexity to networks.
  • It is used to issue addresses to systems.
  • It is used to make numbers larger.
A

It allows an IP address space to be divided into subnets of different sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Who was responsible for the creation of IPv4 protocols?

IBM

Lycos

DARPA

Google

A

DARPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

A class A network has how many network bits set to on?

8

16

24

3

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

**In dotted decimal, which network numbering segment is reserved for loopback?
**
192.168.x.x

172.x.x.x

127.x.x.x

0.x.x.x

A

127.x.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Network Address Translation (NAT)/Address Translation (AT)

A

is a system of assigning public and private IP addresses to computers within an internet network system in order to facilitate the transfer of data to and from the internet

133
Q

Basic NAT

A

one-to-one mapping (1:1 mapping)

134
Q

One-to-Many NAT

A

assigns one private, or internal IP address, to not just one internal host device, but an entire private network of internal host devices.

135
Q

one-to-one mapping translation. It assigns one private IP address to one public IP address. This will be the permanent address for that device.

A

Static NAT (SNAT)

136
Q

Dynamic NAT (DNAT)

A

eliminates the limitation of only one IP address creation per device. Instead, it collects a pool of pre-created, public IP addresses that a private IP address can be translated into when needed.

137
Q

most common type of NAT. This type of translation has several different names, such as overloading, NAT overload, or one-to-many mapping, as discussed.

A

Port Address Translation.
As the name communicates, PAT allows for an overload, or multiple private IP addresses to be translated into a single public IP address.

138
Q

The different types of Address Translations are ______

  • Statin Network Address Translation, Dynamic Network Address Translation. Support Address Translation
  • Gateway Network Address Translation, Dynamic Network Address Translation. Web Address Translation
  • Static Network Address Translation, Dynamic Network Address Translation. Port Address Translation
  • Static Network Address Transformation Dynamic Network Address Transformation. Port Address Translation
A

Static Network Address Translation, Dynamic Network Address Translation. Port Address Translation

139
Q

NAT serves which two main purposes?

  • Protecting the public network from the Internet and conserving the availability of public IP addresses.
  • Protecting the private network from the public domain and conserving the dynamic public IP addresses.
  • Protecting the private network from the public domain and conserving the availability of public IP addresses.
  • Protecting the public network from the private domain and conserving the availability of static IP addresses.
A

Protecting the private network from the public domain and conserving the availability of public IP addresses.

140
Q

In a company setup where users are required to work from home when needed, what is the best address translation?

Port Address Translation

Dynamic NAT

Static NAT

NAT

A

Static NAT

141
Q

If a company with a very low budget needs to lease a public IP address to access the Internet what would you advise and why?

  • Static NAT would be their best option as it would enable them to access their computers remotely.
  • Employing a single ISP would be the best option. they sign up for the public Ip addresses they need
  • Port Address Translation would be their best option as they can pay for a single public IP address and share among the nodes within the network
  • Dynamic NAT would be their best option as they can pay for a single public IP address and share among the nodes within the network. The address would be available to any user on demand.
A

Port Address Translation would be their best option as they can pay for a single public IP address and share among the nodes within the network

142
Q

What is Address Translation(AT)?

  • AT is converting public IP addresses into private IP addresses
  • AT is transposing private IP addresses into public IP addresses
  • AT is converting private IP addresses into public IP addresses
  • AT is mapping private IP addresses to public IP addresses
A

AT is mapping private IP addresses to public IP addresses

143
Q

Routing Information Protocol (RIP)

A

standard used by routers that dictates how data should be shared between a group of individual networks, otherwise known as Local Area Networks.
Using Hops

144
Q

hops

A

the path a data packet travels through to reach each router, as a way to measure which route is most efficient.

145
Q

routing table

A

All routers that utilize RIP contain a dynamic list of all the destinations it can send data to.

146
Q

Routing Information Protocol (RIP) Versions

A

RIP Version 1 utilizes classful routing whereas RIP Version 2 uses classless routing.

147
Q

Classful routing

RIP Versions

A

refers to protocols that do not carry a subnet mask, a set number of available IP addresses available in a network.

148
Q

classless routing

A

does carry subnet masks

149
Q

Which of the following types of routing do NOT carry a subnet mask?

  • Classless routing
  • Routing tables
  • None of these
  • Classful routing
A

Classful routing

150
Q

Which of the following best defines the Routing Information Protocol?

  • It is a standard that determines what information is most valuable to an end user.
  • It is a way for computers to manage their hard drives.
  • It is a method for preventing hackers from infiltrating a network.
  • It is a standard used by routers that dictates how data should be shared between a group of individual networks.
A

It is a standard used by routers that dictates how data should be shared between a group of individual networks.

151
Q

Which of the following refers to the path a data packet travels through to reach each router?

Routes

Jumps

Skips

Hops

A

Hops

152
Q

What is the difference between RIPv1 and RIPv2?

  • RIPv1 utilizes classful routing whereas RIPv2 uses classless routing.
  • RIPv1 uses classless routing, but RIPv2 uses classful routing.
  • RIPv1 and RIPv2 each have their own routing protocol.
  • RIPv1 uses the Routing Information Protocol and RIPv2 does not.
A

RIPv1 utilizes classful routing whereas RIPv2 uses classless routing.

153
Q

Select the term that best completes the sentence.

RIP routers contain _, a dynamic list of destinations that it can send data to.

routing tables

routes

hops

classful routing

A

routing tables

154
Q

is a device that is used to create a network of computers and other devices.

A

switch

155
Q

Central Processing Unit

switch architecture

A

responsible for handling all of the basic instructions on the device. The CPU is akin to how your brain is responsible for sending signals throughout your body to do things like walking, taking a deep breath, blinking, eating and so on.

156
Q

Forwarding Engine

switch architecture

A

component that is responsible for making all of the switching and routing decisions on the device.

157
Q

Switch Fabric

switch architecture

A

comprised of hardware and software that work in tandem to ensure that data coming into the network gets sent out via the appropriate port.

158
Q

Controllers and Buffers

swtich architecture

A

controller is similar to a CPU, but its main focus is controlling tasks such as clocking.
buffers are used to prevent data packets from clogging up the network path.

159
Q

ROM and RAM

swtich architecture

A

ROM is able to store data even without power, whereas RAM cannot.

160
Q

ROM

swtich architecture

A

short for Read-Only Memory, is responsible for the switch’s long-term memory.

161
Q

What type of memory handles the switch’s short-term memory in the switch architecture?.

A

RAM

162
Q

Ports

A

connect devices together

163
Q

Which two components enable a switch fabric to operate?

CPU and Controller

Controller and Buffers

ROM and RAM

Forwarding and Replication Engines

A

Controller and Buffers

164
Q

Which of the following is responsible for the switch’s long-term memory?

CPU

Ports

RAM

ROM

A

ROM

165
Q

A _ is a device that is used to create a network of computers and other devices.

CPU

Replication Engine

switch

Switch Fabric

A

Switch

166
Q

Which switch component allows for devices to be connected to the switch?

Switch Fabric

Ports

RAM

Forwarding Engine

A

Ports

167
Q

Which of the following is NOT a component of a network switch?

CPU

Replication Engine

Bypass Engine

Switch Fabric

A

Bypass Engine

168
Q

Internet Message Access Protocol (IMAP)

A

is a standard internet protocol used for the retrieval of email messages from an email server. I

169
Q

IMAP Port Access

A

a logical point of connection to the internet

170
Q

One of the most common applications of IMAP is:

  • Accessing and managing paired sharing platforms.
  • Accessing and managing shared and system folders.
  • Enabling data communications over a packet switched network on multiple devices.
  • Accessing and managing shared and public folders.
A

Accessing and managing shared and public folders.

multiple people can have access to the same mailbox

171
Q

IMAP can allow a user with multiple devices to _____

  • access their emails simultaneously from any of the devices.
  • access the protocol simultaneously from any of the devices.
  • consolidate system updates on all devices.
  • synchronize playback of multimedia from all devices.**
A

access their emails simultaneously from any of the devices.

172
Q

IMAP is the vehicle by which _

  • client applications are moved, organized and manipulated between the mail server and the mail client application
  • compatibility updates are synchronized between Outlook and other email servers.
  • synchronization is achieved between email clients and ISPs.
  • messages are moved, organized and manipulated between the mail server and the mail client application.
A

messages are moved, organized and manipulated between the mail server and the mail client application.

173
Q

What is IMAP?

  • (IMAP) is a standard internet protocol used for the retrieval of email messages from an email server.
  • (IMAP) is a standard internet protocol used for data packets and addressing schemes for computers to communicate over the internet.
  • (IMAP) is a standard internet protocol used for email packets and addressing schemes.
  • (IMAP) is a standard logical connection used for the retrieval of email packets between applications.
A

(IMAP) is a standard internet protocol used for the retrieval of email messages from an email server.

174
Q

The secure logical connection to which IMAP is bound to connect to the internet is _

  • Port 143
  • Logic 993
  • Port 993
  • Part 143
A
175
Q

networking commands

A

are used at the command prompt to get network information like the IP address of the system (remember that an IP address is the address of your device in a network), MAC address, network route traversed by a packet, and the IP address of the server in which a website or URL is hosted.

176
Q

Network Command Types (7)

A
  • ipconfig
  • ifconfig
  • tracert
  • ping
  • netstat
  • nslookup
  • getmac
177
Q

which is used for finding the IP address and default gateway of your network.

Network Command Types (7)

A

ipconfig command

178
Q

Network Command Types (7)

A
179
Q

ifconfig command

Network Command Types (7)

A

which is mainly used to find an address to a network interface and to configure or display current network interface configuration information of a system.

180
Q

tracert command

Network Command Types (7)

A

which is used to get an insight to the network route followed when a machine connected to a network tries to access a server on which a particular website is hosted.

181
Q

ping command

Network Command Types (7)

A

which is typically used for checking the network connectivity from your system to an end device like a server or a printer and also of a website.

182
Q

netstat command

Network Command Types (7)

A

which is used for displaying the active connections and ports which are connected to the current machine.

183
Q

nslookup command

Network Command Types (7)

A

which is used for diagnosing the Domain Name System (DNS) infrastructure.

184
Q

** getmac command**

Network Command Types (7)

A

which is used to find a computer’s MAC address. Remember that a media access control (MAC) address is a unique physical address of a computer, which is assigned specifically by the manufacturers of that computer.

185
Q

In order to check the nodes that are connected to a system, one can use the command

netstat

ping

nslookup

tracert

A

netstat

186
Q

What is the result of entering nslookup command in the command prompt?

IP address of the host server

MAC address of the system

IP address of the system

MAC address of the host server

A

IP address of the host server

187
Q

Which command helps to identify whether a given system is connected to a network?

ifconfig

getmac

ping

netstat

A

ping

188
Q

refers to the layout patterns of the interconnections between computers in a network. It is also referred to as network architecture.

Network topology

A

Network topology

189
Q

Point-to-Point

Network topology

A

is the** simplest **of all the network topologies. The network consists of a direct link between two computers. This is faster and more reliable than other types of connections since there is a direct connection

190
Q

Bus

Network topology

A

uses one main cable to which all nodes are directly connected. The main cable acts as a backbone for the network. One of the computers in the network typically acts as the computer server. The first advantage of bus topology is that it is easy to connect a computer or peripheral device. The second advantage is that the cable requirements are relatively small, resulting in lower cost.

191
Q

Star

Network topology

A

each computer is connected to a central hub using a point-to-point connection

192
Q

Ring

Network topology

A

the computers in the network are connected in a circular fashion, and the data travels in one direction.

193
Q

Mesh

Network topology

A

every node has a direct point-to-point connection to every other node. Because all connections are direct, the network can handle very high-volume traffic. It is also robust because if one connection fails, the others remain intact. Security is also high since data travels along a dedicated connection.

194
Q

combines multiple star topologies onto a bus. Hub devices for each star topology are connected to the bus. Each hub is like the root of a tree of devices. This provides great flexibility for expanding and modifying the network.

Network topology

A

Tree

195
Q

Hybrid

Network topology

A

combination of two or more topologies. Hybrid networks provide a lot of flexibility, and as a result, they have become the most widely used type of topology. Common examples are star ring networks and star bus networks. Tree topology is one specific example of a star bus network.

196
Q

Consider a number of computers are in a network, and one computer crashes. In which of the following network topologies will the entire network also go down?
Star
Ring
Mesh

Tree
Bus

A

Ring

197
Q

Topology

A

arrangement in which various network devices or network systems are connected.

198
Q

describes the actual or the physical layout of a network, such as the physical arrangement of wires, media (computers), or cables in a network.

  • bus
  • mesh
  • star
  • ring
A

Physical topology

199
Q

path taken by the various signals in networking

A

signal topology

200
Q

Token-based

physical topology

A

access requires authentication before accessing and sharing data

201
Q

shared media access

physical topology

A

requires no authentication, and thus any computer in the network can share data without restrictions, which can cause collisions at various signal nodes.

202
Q

** Ethernet**

physical topology

A

is an example of shared media access.

203
Q

Logical topology

A

indicates how various hosts within a network communicate across the medium, i.e., it exhibits how data or signals in a network flow.

204
Q

Broadcast topology

logical topology type

A

This topology allows a host to send data to all other hosts available in that network. No order or restrictions are observed among the hosts regarding sharing data.

205
Q

Token-passing topology

logical topology type

A

This topology only allows the sharing of data to hosts through the access of an electronic token. This token is typically shared with each host in an orderly way. However, if one host has no data to share, the electronic token is passed to the next host in the sequence.

206
Q

The _ of a network describes how the connections appear to the end user or how signals are passed across the network.

  • physical topology
  • protocol suite
  • signal pattern
  • logical topology
A

logical topology

207
Q

Ethernet is an example of which kind of signal topology?

  • shared media access
  • token-based access
  • wireless
  • switch based
A

Shared Media Access

208
Q

The _ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.
diagram
electrical

physical
logical

A
209
Q

Network switching

A

is the process of channeling data received from any number of input ports to another designated port that will transmit the data to its desired destination.

210
Q

Circuit switching

A

is defined as the establishment of a dedicated communication path between the two parties, or nodes, within a physical network.

211
Q

Packet switching

A

is defined as the process of breaking down messages into small components, called packets.

212
Q

multi-protocol label switching (MPLS)

A

the ability for the intermediate routers to make these independent decisions are eliminated. MPLS is a network routing mechanism that directs packets to their final destination using an assigned label.

213
Q

The label in multi-protocol label switching contains _.

  • the routers ingress and egress routing information
  • information on the predefined path for the packets to reach their destination
  • complete routing table information
  • the ingress and exit router information
A

information on the predefined path for the packets to reach their destination

214
Q

In MPLS switching, the routing decision is made _.

  • at each network hop
  • by the first routing device and forms the predefined path for subsequent routers
  • by the exit routing device and forms the predefined path for ingress
  • when the path is set up across the network
A

by the first routing device and forms the predefined path for subsequent routers

215
Q

One characteristic of MPLS switching is that it _.

is very inefficient

prevent multiple network hops

prevents network congestion

has little control on network traffic

A

prevents network congestion

216
Q

The difference between circuit switching and packet switching is _.

  • circuit switching uses destination labels, while packet switching uses routing labels
  • with circuit switching the whole message is transmitted as one using a dedicated path, while with packet switching the message is broken down into small components called packets
  • circuit switching is more vulnerable to network congestion than packet switching
  • with circuit switching the message components takes independent paths to their final destination, while with packet switching the message takes one path to the final destination
A

with circuit switching the whole message is transmitted as one using a dedicated path, while with packet switching the message is broken down into small components called packets

217
Q

What is network switching?

  • The process of labeling network hops from any number of input ports to another designated port
  • The process of channeling data messages or data packets received from any number of input ports to another designated port that will transmit the data to its desired destination
  • A switching device that controls the volume of network traffic in a system
  • The process of channeling network routers received from any number of input ports to another designated port that will transmit the router to its desired destination
A

The process of channeling data messages or data packets received from any number of input ports to another designated port that will transmit the data to its desired destination

218
Q

Ethernet

A

is the most commonly used LAN technology. It dictates the technical specifications of hardware for connectivity; the number of connections permitted, performance thresholds and the overall framework that governs data transmission(types of vehicles, maximum height and speed limit).

219
Q

Carrier Sense Multiple Access/ Collision Detection (CSMA/CD)

A

One of the main standards of the Ethernet technology

220
Q

Fast Ethernet standard

A

IEEE 802.3u
1. 100 Base - TX
2. 100 Base - FX
3. 100 Base - T

221
Q

What type of ethernet is the following?

  1. 10 GBase - SR
  2. 10 GBase - LX4
  3. 10 GBase - SW/LW/EW
A

Gigabit Ethernet

222
Q

The unit of data which is carried by an Ethernet Link in the Network Access layer

A

Ethernet Frame

223
Q

Ethernet Frame header

A

which contains details of the source and destination MAC addresses,

224
Q

Frame Check Sequence

A

The middle section, which contains the packet data and the frames last section

225
Q

Ethernet is the _.

  • Unit of data which is carried by an Ethernet Link by the Network Access layer
  • LAN technology that dictates geographical specifications of networks worldwide
  • Protocol which which waits for the channel to be idle then transmits data
  • LAN technology that dictates the technical specifications of hardware for connectivity
A

LAN technology that dictates the technical specifications of hardware for connectivity

226
Q

The Frame Check Sequence (FCS) within an Ethernet frame serves to _

Meet the VoIP needs over the channel

Detect data collision

Detect corrupted data

Identify the transmitting device

A

Detect corrupted data

227
Q

Ethernet usually permits each node in the network to transmit data packets at any time which can cause _

Error correction

Data collision

Multiple Access

Data re-transmission

A

Data collision

228
Q

What Ethernet Standard Specification is suitable for a network requiring 100 Mbps speed and 2000 max cable distance?

100 Base - FX

10 GBase - SW

100 Base - TX

10 GBase - LX4

A

100 Base - FX

229
Q

LAN Card

A

is the network interface card that is used by the device to communicate with the network. LAN Cards can be classified as wireless or wired. Wired LAN Cards are also called conductive LAN Cards.

230
Q

Wireless LAN Cards

A

generally will have some sort of an external antenna and will utilize Wi-Fi protocols to connect to the network

231
Q

Integrated LAN Cards

A

Most modern motherboards have a LAN Card integrated into the motherboard circuitry.

232
Q

PCMCIA

A

laptops used slots, also known as PC Card slots, that could allow for the connection of a wired or wireless LAN Card.

233
Q

Integrated Wi-Fi: NIC Card

A

modern laptops have an integrated LAN Card, and many have both a Wi-Fi and an Ethernet interface.

234
Q

a computer network describes the material substances that carry energy waves, which include the data being transferred.

A

transmission media

235
Q

Repeater

Telecommunications Hardware

A

a device that receives electronic signals, cleans them and retransmits them at a higher power level. Signals transmitted over cable tend to degrade over long distances

236
Q

Hub

Telecommunications Hardware

A

a networking device used to connect multiple devices directly to the network using cables. Each connection is called a ‘port.’ The connections typically consist of a fiber optic Ethernet cable.

237
Q

Switches

Telecommunications Hardware

A

contain many ports to connect different network segments. They are similar to hubs, but offer greater performance.

238
Q

networking devices that divide up the network into different segments to manage the amount of traffic

Telecommunications Hardware

A

Bridges

239
Q

Routers

Telecommunications Hardware

A

communication devices used to connect two different networks

240
Q

Gateway

Telecommunications Hardware

A

interfaces networks that use different protocols

241
Q

What modulates and demodulates data signals?

A

Modems

242
Q

is a piece of hardware that allows individual computers to physically connect to a network.

A

network interface card (NIC)
An NIC contains the electronic circuitry required for a wired connection (Ethernet) or a wireless connection (Wi-Fi).

243
Q

How does the use of a router differ from a bridge in telecommunication?

  • A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
  • Routers contain many ports to connect different network segments, while a bridge ensures that requests from within the network for information over the internet are distributed to the correct computer within the network.
  • A router receives electronic signals, cleans and retransmits them at a higher power level, while a bridge receives electronic signals, cleans and retransmits them at a lower power level.
  • A router contains many ports to connect different network segments, while a bridge sends data it receives only to specific ports.
A

A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.

244
Q

Which of the following devices can be used to interface computer networks that use different communication protocols?

Router

Repeater

Gateway

Hub

A

Gateway

245
Q

Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports?

Gateway

Hub

Router

Switch

A

Switch

246
Q

What type of hardware device is a WiFi card?

A special card that gives you free access to WiFi hotspots

A device that encrypts a signal before it is transmitted over a WiFi connection

A port on a computer to plug in a WiFi cable

A network interface card to establish a wireless connection

A

A network interface card to establish a wireless connection

247
Q

Wide Area Network, or WAN,

A

is used to connect physically separated locations on a network. WANs can connect buildings that are across town or across the world on the same network.

  • Cost
  • Performance
  • Reliability
  • Resiliency
248
Q

Hub and Spoke

WAN Design

A

design technique where remote or branch office locations are all connected to the main location using a single point-to-point connection.

249
Q

Full Mesh Network Topology

WAN Design

A

To remedy the deficiencies of the hub and spoke WAN

250
Q

Common carriers for WAN

A
  1. MPLS
  2. Dedicated Lines
  3. Frame Relay (discontinued)
  4. Ethernet
  5. SD-WAN
  6. Dark Fiber
251
Q

Of the options listed, which is the most used WAN (Wide Area Network) carrier?
Dedicated Lines
Frame Relay

MPLS
Dark Fiber

A

MPLS

252
Q

What are two common WAN (Wide Area Network) design types?
Main input; Redundant Input
Remote singular; Integrated topology

Hub and spoke; Full mesh topology
MPLS; SD-WAN

A

Hub and spoke; Full mesh topology

253
Q

If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?
A hub and spoke design.
A bus design.

A full mesh design.
A star design.

A

A full mesh design.

254
Q

Wide Area Network (WAN)

A

is a communication network of devices, which spans geographical areas. It’s an interconnection across geographical locations, of multiple Local Area Networks (LANs), which are small communication networks in the same locality.

255
Q

Network topology

A

describes the arrangement by which the components of networks (LANs or WANs) are organized.

256
Q

ring topology

A

Network traffic can be routed in both directions. This makes this topology less vulnerable than the bus topology. If a line connection fails, traffic is rerouted in the opposite direction and communication is not lost.

257
Q

star topology

A

the sites are arranged in a star formation. There is a central hub and each site is connected directly to the hub.

258
Q

mesh topology

A

every device belonging to the network is connected to every other device in a mesh formation.

259
Q

tiered topology

A

entails the interconnection of clusters of star network WANs by the use of concentration routers.

260
Q

In WANs, which of the following is NOT a characteristic of mesh topology?

  • Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
  • Implementation incurs high costs
  • Data transmissions are carried out via multiple routes
  • All sites are connected to each other
A

Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites

261
Q

What is a WAN topology?

  • WAN topology describes the arrangement concentration routers monitoring the LANs
  • WAN topology describes a system by which the components within the WAN are named
  • WAN topology describes the arrangement by which components within the WAN are organized
  • WAN topology describes the arrangement by which the mesh components within the WAN are distributed
A

WAN topology describes the arrangement by which components within the WAN are organized.

262
Q

Four types of WAN topologies are _

  • Mesh, star, ring, bus topologies
  • Ring, star, teared, mess topologies
  • Bus, ring, stay, tiered topologies
  • Mesh, rind, star, tiered topologies
A

Mesh, star, ring, bus topologies

263
Q

Which network topology uses concentration routers to interconnect star network WANs?

Tiered topology

Mesh topology

Ring topology

Bus topology

A

Tiered topology

264
Q

In WANs, what advantage does the ring topology have over the bus topology?

Concentration servers stabilize data transmission

Data transmission is multidirectional

It is hardware intensive and so implementation is expensive

Adding and removing nodes is easy

A

Data transmission is multidirectional

265
Q

DSL (Digital Subscriber Line)

A
  • like dial-up, it also used the same phone line connector cable.
  • DSL over dial-up is that it offers the user a much higher rate of speed
266
Q

DSL Asymmetric

A

(higher download speeds with lower upload speeds)

267
Q

DSL Symmetric

A

equal download and upload speeds).

268
Q

What is one of the major differences between a DSL network and a cable network?

  • DSL only worked well if the modem was close to the main service area, cable does not have such restrictions.
  • All of these answers are correct.
  • DSL was more expensive to implement than cable.
  • DSL is more stable and reliable than cable.
A

DSL only worked well if the modem was close to the main service area, cable does not have such restrictions.

269
Q

What is a unique downside that consumers face with a traditional cable network connection versus that of DSL?

  • Overall network stability and reliability are lower.
  • The cost per month of service is higher.
  • Surrounding neighbors can affect the network bandwidth during peak hours.
  • None of these answers are correct.
A

Surrounding neighbors can affect the network bandwidth during peak hours.

270
Q

What are the benefits of a DSL network over the previous method known as dial-up?

  • All of these answers are correct.
  • Having much higher network speeds overall.
  • Being able to talk on the phone and surf the web at the same time.
  • Much more stability in terms of network reliability.
A

All of these answers are correct.

271
Q

Short-range wireless communication

A

uses signals that travel very short distances, from a few centimeters to several meters. Examples include Bluetooth, infrared and Zigbee.

272
Q

Medium-range wireless communication

A

uses signals that travel up to 100 meters or so. The most widely used type is Wireless Fidelity, or Wi-Fi.

273
Q

Wide area wireless communication

A

uses signals that travel quite far, from several kilometers to several thousand kilometers. Examples include cellular and satellite communications.

274
Q

mobile phone

A

is an electronic device to make and receive phone calls over a radio link while moving through an area.

275
Q

tablet computer, or simply a tablet,

A

is a mobile computer where all components are integrated into a single unit.

276
Q

personal digital assistant, or PDA,

A

is a mobile device that is dedicated to managing personal information.

277
Q

satellite phone

A

allows you to make a phone call anywhere in the world by using two-way communication with satellites specifically designed for this purpose.

278
Q

Global Positioning System, or GPS unit,

A

is an electronic device that receives signals from a collection of GPS satellites and uses this information to calculate your location.

279
Q

Bluetooth

A

is a type of wireless communication used to transmit voice and data at high speeds using radio waves.

280
Q

Infrared (IR) light

A

is electromagnetic radiation with wavelengths that are just beyond those of visible light.

281
Q

Zigbee

A

is a wireless communication technology for short-range, low-power digital radio communications.

282
Q

Ultra-wideband, or UWB,

A

is a short-range communication technology that uses extremely short magnetic pulses.

283
Q

Near field communication, or NFC,

A

is a very short-range communication technology for things like consumer electronics, mobile phones and credit cards. Devices have to be in very close proximity, typically a few centimeters.

284
Q

Which of the following is not a typical application of Bluetooth wireless communication?
* Hands-free calling by connecting a mobile phone to a car’s stereo system
* Wireless connection between a computer and peripheral devices (e.g mouse, keyboard, camera, printer)
* Wireless headset for a mobile phone
* Connecting several devices to the wireless Internet.

A

Connecting several devices to the wireless Internet.

285
Q

Relative to other technologies such as Bluetooth, WiFi and cellular, Zigbee provides wireless communication that provides _.
Longer battery life
Longer range and lower cost

Lower cost
Lower cost and longer battery life

A

Lower cost and longer battery life

286
Q

What is the approximate distance between devices when establishing a connection using short-range wireless communication?
* 1 to 100 meters
* From a few centimeters to approximately 1 kilometer
* 3 to 5 meters
* From a few centimeters to several meters

A

From a few centimeters to several meters

287
Q

A set of network devices (for example workstations) that look as though they are connected through the same network and thus share the same broadcast domain.

A

Virtual Local Area Network (VLAN)

288
Q

the network administrator must physically set individual ports on a switch to point to a specific VLAN. This provides only a single option - forwarding the ports on a switch to a specific VLAN - which is good for general purposes.

A

static VLAN environment,

289
Q

gives the network administrator more flexibility to set up a more advanced network. For example, being able to specify user account names instead of specific ports allows for more finely tuned control over the network.

A

dynamic VLAN environment

290
Q

In a _ VLAN, the network administrator must set the ports on a switch to forward the traffic to a specific VLAN.

static

single

double

dynamic

A

static

291
Q

A _____ is a group of network devices that look like they are all connected to a single network even if they are not in the same location.
VLAN

All of these answers are correct.

Router

Modem

A

VLAN

292
Q

A VLAN is created by multiple _ that forwards all network traffic to other locations.

routers

All of these answers are correct.

modems

switches

A

switches

293
Q

is one of the oldest remote access methods, as old as the Internet itself. Telnet dates back to 1969 and was designed for the fledgling ARPANET,

A

Telnet

294
Q

makes remote connections more robust over unreliable connections for laptops, tablets smarphones, wifi cellular

A

Mosh, or Mobile Shell,

295
Q

VPN, or Virtual Private Network,

A

is another popular remote access method. It aims to give remote employees access to company resources such as email, wikis, content management systems or customer relationship management systems as if they were on a company intranet.

296
Q

What access method works best over mobile connections?
SSH.
VPN.
Telnet.
Mosh.

A

Mosh

297
Q

What main use does Telnet have in modern IT?
Telnet is often used for embedded devices.
Telnet offers remote access to Intranet resources.

Telnet is used for fun things like games.
Telnet is used for secure access to remote computers.

A

Telnet is often used for embedded devices.

298
Q

What makes Mosh an alternative to SSH?
* Mosh is faster than SSH.
* Mosh can reconnect if a wireless connection gets interrupted.
* Mosh is easier to set up than SSH.
* Mosh is more secure than SSH.

A

Mosh can reconnect if a wireless connection gets interrupted.

299
Q

Why is Telnet discouraged as an access method?
It’s very old.
Telnet only uses text.

Telnet is slow.
Telnet is unsecure.

A

Telnet is unsecure.

300
Q

The countermeasures that are implemented on a network to keep the network and data safe from hackers, fraudsters, criminals, and negligent employees.

A

network security

301
Q

Hardware appliances

A

are special servers or network equipment that perform a specific network security function.

302
Q

network security software can be installed on

A

servers or PCs to enable network protection functions.

303
Q

This type of network security is provided to your company as a service and is often called a

A

cloud service

304
Q

If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?
IPS/IDS
Web content filter

DLP
DDoS protection

A

DLP

305
Q

When can a network security hardware appliance stop threats on the network?
* When it is installed in line.
* It can stop threats whether it is installed in or out of line.
* It can never stop threats.
* When it is installed out of line.

A

When it is installed in line.

306
Q

Data loss prevention (DLP)

A

is a technology that is normally integrated into a firewall or other security systems. It uses pattern recognition to prevent sensitive data from leaving the corporate network.

307
Q

Business Continuity:

A

Effective network security measures contribute to business continuity by minimizing the impact of cyberattacks and disruptions. A secure network ensures that critical services and resources remain available even during security incidents.

308
Q

_______is a technique that allows potentially harmful software to be executed in a controlled, isolated environment. It enables the analysis of the software’s behavior without affecting the main network. Sandboxing helps identify and prevent the spread of malware and zero-day threats by containing them within a safe environment.

A

Sandboxing

309
Q

________ involves dividing a network into smaller, isolated subnetworks. Each segment operates independently, limiting the impact of potential security breaches. It enhances network performance, isolates sensitive data, and reduces the attack surface, making it more difficult for attackers to move laterally within the network.

A

Network segmentation

310
Q

Which of the following is NOT one of the core elements of network security?

Privacy

Integrity

Availability

Confidentiality

A

Privacy

311
Q

In addition to network security operators, who might be involved with network security?

Construction engineers

Lawyers

Locksmiths

All of the answers are correct.

A

Locksmiths

312
Q

Which of the following is NOT an element of access in regards to network security?

Accounting

Authorization

Authentication

Availability

A

Availability

313
Q

Network security,

A

as a whole, refers to all attempts to protect the usability, integrity, and safety of your electronic data and network.

314
Q

repudiate

A

means to deny or contest something

315
Q

non-repudiation

A

must be the ability to ensure that someone cannot deny or contest that thing.
* certified mail
* notary public
* read reciept
* Digital signatures
* Biometrics
* Confirmation services
* Timestamps
* Digital certifcates
* public key infrastructure

316
Q

__ is a technology that delivers video services from one device to another over a computer network which are connected to the internet.

A

Video-Over IP

317
Q

______which describes methods or protocols used to distribute data between two or more devices.

A

Internet Protocol

318
Q

The primary transfer protocols of TCP/IP protocol stack are the

A
  1. Transmission Control Protocol (TCP) 2. the User Datagram Protocol (UDP).
319
Q

Characteristics of Video-Over IP

A
  1. scalability
  2. no distance limitations
  3. cost saving
  4. provides power over ethernet
  5. reduce bandwidth for compressoin, transmission and storage
320
Q

Streaming Video

A

Live Streaming
On demand Streaming
Download and play

321
Q

The latest video compression format is _____.

MPEG

JPEG

H.323

H.264

A

H.264

322
Q

provide a way to send and receive the voice or video messages from one device to another.

A

Transport protocols

323
Q

What is the part of the transport protocol responsible for facilitating the transfer of audio and video components over the internet?

A

RTP, or Real-Time Transport Protocol,
Without RTP, you have no VoIP.

324
Q

RTCP, or Real-Time Transport Control Protocol - RTP’s sister.

A

While RTP does the heavy lifting of moving data, RTCP works alongside her to help with quality control.

325
Q

Which part of the transport protocol works in conjunction with signaling protocols in VoIP communications?

RTP

REP

RTCP

RIP

A

RTP

326
Q

What role do transport protocols play in video or voice over IP communications?

They deliver the audio and video data.

They eliminate wireless noise.

They choose the type of message.

They determine device location.

A

They deliver the audio and video data.

327
Q

Why is the role of RTCP important in VoIP communications

  • It connects the VoIP service to the local area network.
  • It allows video packets to be sent between multiple devices.
  • It allows the sender to select what type of message to send.
  • It allows adjustments to be made to fine-tune transmissions.
A

It allows adjustments to be made to fine-tune transmissions.

328
Q

RTCP as a transport protocol doesn’t deliver any data. Instead, it focuses on _.

Password acceptance

Wi-Fi controls

Quality control

Logistical transfer

A

Quality control

329
Q

If a video call lags or buffers, which part of the transport protocol works to report on that to remedy the situation?

RTCP

RTP

REP

RIP

A

RTCP