Pop Quiz Flashcards

1
Q

Which layers of the OSI reference model contains the MAC and LLC sublayers
A. Network layer
B. Transport layer
C. Physical layer
D. Data link layer

A

D
Divided into sub layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data
A. Broadband
B. Baseband
C. Time-division multiplexing
D. Simplex

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windowing is provided at what layer of the OSI reference model
A. Data link layer
B. Network layer
C. Transport layer
D. This physical layer

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP addressing reside at which layer of the OSI reference model
A. Network layer
B. Session layer
C. Data link layer
D. Transport layer

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a connection less transport layer protocol
A. IP
B. TCP
C. UDP
D. SIP

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What setting ultimately controls the size of packets that are moving though the modern network
A. TTL
B. MTU
C. SSH
D. CSMA/CD

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the range of well-known TCP and UDP ports
A. Below 2048
B. Below 1024
C. 16,384-32,768
D. Above 8192

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What port number uses HTTPS
A. 80
B. 443
C. 68
D. 23

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What value is decremented by one of each router hop on the network
A. Count
B. Type
C. TTL
D. Dead timer

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Windowing is a technology that applies to which transport layer protocol
A. UDP
B. FTP
C. ICMP
D. TCP

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Windowing is a technology that applies to which transport layer protocol
A. UDP
B. FTP
C. ICMP
D. TCP

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens to data as it moves from the upper layers to the lower layers of the OSI model on a host system
A. The data moves from the physical layer to the application layer
B. The data is encapsulated with a header at the beginning and a trailer at the end
C. The header and trailer are stripped off though decapsulation
D. The data is sent in groups of segments that require two acknowledgements

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which layer of the OSI reference model is responsible for ensuring that frames do not exceed the maximum transmission unit (MTU) of the physical media
A. Network layer
B. Transport layer
C. Physical layer
D. Data link layer

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What DSL variant has a distance limitation of 18,000 feet between a DSL modem and its DSLAM
A. HDSL
B. ADSL
C. SDSL
D. VDSL

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What kind of network do many cable companies use to service their cable modems with both Forbes-optic and coaxial cabling
A. Head-end
B. DOCSIS
C. Composite
D. HFC

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these components is used to make virtualisation possible in the server environment by permitting multiple systems to use the underlying hardware of the host system
A. vNIC
B. vSwitch
C. SD-WAN
D. Hypervisor

17
Q

If you are unable to connect to the internet shat IP address will you have

A

APIPA IP address (169.254.X.X

18
Q

What type of IP address is 192.168.0.X

A

Private IP address

19
Q

If you DHCP scope is exhausted and you want to connect clients to the network without creating a new DHCP pool what will you do?

A

Reduce the lease time (kicking inactive devices off the network)

20
Q

Which of the following DNS records works as an alias to another record
A) AAAA
B) CNAME
C) MX
D) A

A

B) CNAME means to have an alias

21
Q

Which of the following is used to track and document various types of known vulnerabilities
A) Least privilege
B) Zero Day
C) CVE
D) Penetration testing

22
Q

What port is SSH

23
Q

What port is Telnet

24
Q

What port is DNS

25
What port is HTTP
80
26
What port is HTTPS
443
27
What port is RDP
3389
28