Chapter One Questions
What is the fundamental distinction between a MAN and a WAN?
A MAN is a group of connected LANs within a limited geographical area such as a group of buildings, while a WAN covers a larger geographical area.
What is the name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?
Active Directory
In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? Active Directory Federated Users (AD FU) Windows Named Resource Services (WN RS) Automated Directory Network Services (AD NS) Active Directory Domain Services (AD DS)
Active Directory Domain Services (AD DS)
At what layer of the OSI model does a network switch normally operate? Layer 4 Layer 2 Layer 5 Layer 3
Layer 2
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? Layer 7 Layer 5 Layer 6 Layer 4
Layer 7
The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? DAC (Data Access Control) address MAC (Media Access Control) address PAC (Packet Access Control) address DAC (Digital Access Control) address
MAC (media access control) address
The proper handling procedures for substances such as chemical solvents are typically outlined in which of the following options? Environmental Chemical Hazard Sheet (ECHS) Material Safety Data Sheet (MSDS) Toxic Chemical Safety Procedure (TCSP) Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
Material Safety Data Sheet (MSDS)
What mail protocol is used to send mail messages to a server? SMTP HTTPS POP3 IMAP4
SMTP
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? Application layer Session layer Transport layer Presentation layer
Session layer
If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? star bus topology star topology mesh topology bus topology
star topology
In the United States, who can activate the Emergency Alert System at the national level? the President any U.S. state or territory the Federal Bureau of Investigation local law enforcement
the president
When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? catastrophic failure interrupting failure temporary failure upset failure
upset failure
What is the minimal amount of voltage required to damage an electrical component? 100 volts 5 volts 10 volts 1500 volts
10 volts
What is the fundamental distinction between a Layer 2 switch and a router?
A router belongs to two or more networks, while a switch only belongs on its local network.
What is a defining characteristic of a bus topology-based network? Devices are connected directly to a centralized networking device, known as a network switch. Devices are directly attached to a network router, which forwards data to intended destinations. Devices are daisy-chained together in a single line. Devices are connected to two adjacent devices, and communication priority is granted by a token.
Devices are daisy-chained together in a single line.
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? Session Application Network Transport
Network
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use? Hybrid Ring Star-bus Peer-to-peer
Peer-to-peer
Which type of address is used at the Transport layer to identify the receiving application? Protocol IP address Port MAC address
Port
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? SSH SFTP Remote Desktop Telnet
Remote Desktop
The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? Secure Sockets Layer (SSL) File Transfer Protocol (FTP) Secure Shell (SSH) Remote Desktop Protocol (RDP)
Remote Desktop Protocol (RDP)
What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? SMTP HTTP SNMP POP3
SNMP
Which two encryption protocols might be used to provide secure transmissions for browser and web server communications? SSL and TLS TCP and UDP SSL and HTTP HTTP and HTTPS
SSL and TLS
At the Network layer, what type of address is used to identify the receiving host?
the IP addresses are used.
At the Data Link layer, which type of network address is used to identify the receiving node?
the MAC address
What is the fundamental distinction between a node and a host?
A host is a device which provides resources, while a node is any device that can be addressed on a local network.
What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work?
A message delivered by TCP is called a segment, while a message delivered by UDP is called a datagram. These protocols work within the transport layer.
What is the most popular web server application? NGINX Microsoft Internet Information Services Lighttpd Apache
Apache
In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? Application Link Internet Transport
Application
You have a network that consists of seven computers running Windows 10 Professional. You add an eighth computer with Windows Server 2016 installed. Which networking model can the network now support that it could not support without the addition of the eighth computer? Star-bus Hybrid Client-server Ring
Client-server
In the client-server model, what is the primary protocol used for communication between a browser and web server? FTP TCP HTTP SSL
HTTP
Which email protocol allows an email client to read mail stored on the mail server? IMAP4 TCP SMTP POP3
IMAP4
What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node? MAC address IP address port address autonomous system address
IP address
What federal agency is charged with safety and health in the workplace? Hazardous Materials and Safety Management (HMSM) Workplace Safety and Hazard Administration (WSHA) Office Safety and Standards Department (OSSD) Occupational Safety and Health Administration (OSHA)
Occupational Safety and Health Administration (OSHA)
Which email protocol allows an email client to download email messages to the local computer? TCP POP3 SMTP IMAP4
POP3
In the TCP/IP model, what layer is considered so simple that it is ignored entirely? Physical Application Data Link Network
Physical
What statement accurately reflects what occurs when a message is too large to transport on a network? An ICMP error is generated, and the application must reformat the data for transmission. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). The message is sent anyway, and is received by the destination as garbage data. The message is discarded and must be sent again.
The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire? fire extinction agent extinguishing medium fire suppression agent eliminating factor
fire suppression agent
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? fail-dynamic fail-tolerant fail-open fail-close
fail-close
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? Mesh Star-bus Hybrid Star
Star
You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the network so you add a second switch by connecting it to the first switch by way of a network cable. Which network topology is now used? Star-bus Mesh Hybrid Star
Star-bus
In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? The Presentation layer describes the interface between two applications, each on separate computers. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. The Presentation layer is responsible for transporting Application layer payloads from one application to another. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
Which of the following is an example of encapsulation? The addition of a header to data inherited from the layer above in the OSI model. The subtraction of a header from data inherited from the layer below in the OSI model. The modification of headers from a higher layer in the OSI model. The addition of a trailer to data inherited from the layer above in the OSI model.
The addition of a header to data inherited from the layer above in the OSI model.
What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. The packet will be divided into smaller packets using fragmentation. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination. The packet will be dropped silently, requiring the communicating application try again.
The packet will be divided into smaller packets using fragmentation.
Which of the following is not one of the disadvantages of peer-to-peer networks? They centralize user account logins. They are not necessarily secure. They lack scalability. They are impractical for connecting large numbers of computers.
They centralize user account logins.
A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
Tphysical layer. the data link and physical layer.
The TCP and UDP protocols both exist at what layer of the OSI model? Application Network Presentation Transport
Transport
A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you begin troubleshooting? Which OSI layer is responsible for not dropping the Skype connection?
application layer session layer.
A user complains that he cannot access a particular website, although he is able to access other websites. At which layer of the OSI model should you begin troubleshooting this problem?
application layer.
A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? fail-open fail-close fail-tolerant fail-oriented
fail-open
The Data Link layer utilizes what name for its protocol data unit (PDU)? packet data bit frame
frame