CS240 Quizzes

¡Supera tus tareas y exámenes ahora con Quizwiz!

The following is a valid method for creating an image

-Issuing interactive commands -Using a dockerfile -Importing from a tarball file

All of the following are valid states for a Docker process except

Deleted

Which Application Layer threat occurs when an attacker consumes the resources on a target computer for things it was not intended to be doing, thus preventing normal use of network resources for legitimate purposes?

Denial of Service (DoS)

By default, your Docker environment is configured to pull images from

Docker Hub

Docker containers have revolutionized the ____software supply chain___________.

Docker makes it possible to virtualize the operating system itself along with the application and every associated component. This makes the entire container: Highly portable and able to run anywhere. Lightweight and highly scalable.

Which of the following is an OSI Layer 4 (Transport Layer) service that ensures the source and destination computers work together to detect when packets do not arrive within a reasonable time period, and then retransmit missing packets?

Error control

True or False? Layer 3 is within a local area network (LAN), whereas Layer 2 is outside a LAN.

False (Layer 2 is within LAN, Layer 3 is outside the LAN)

True or False? Whereas redundancy is the ability to recover from a failure, resiliency means that there are multiple ways to carry out a task.

False (Opposite)

Which of the following is not typically used for internetworking?

Firewall

Which of the following is a common feature or characteristic of the business to consumer (B2C) model?

Fixed or limited pricing

Which of the following is an OSI Layer 4 (Transport Layer) service that manages the pacing of data transmissions to avoid collisions and congestion?

Flow control

Which of the following relies most heavily on requests for proposal (RFPs) as the primary method of procuring services and products?

Government

Which of the following cloud service models offers SaaS solutions as professional services and not just software?

Anything else as a Service (Aaas)

The layer of the OSI model that interacts with a human rather than another technological element is:

Application

Which of the following converts fully qualified domain names (FQDNs) into numeric IP addresses or IP addresses into FQDNs?

Domain Name System (DNS)

Which of the following is a hierarchical naming system that allows organizations to associate host names with IP address namespaces?

Domain Name System (DNS)

Which protocol requests and assigns IP addresses on a network?

Dynamic Host Configuration Protocol (DHCP)

Which of the following is not true of Internet Protocol version 6 (IPv6)?

Dynamic Host Configuration Protocol (DHCP) cannot assign IPv6 addresses to devices on a network (They can)

Which of the following is not an example of a common real-time communication method?

Email

Internet Protocol version 6 (IPv6) accomplishes all of the following, except:

Enables 2+ devices that connect to the Internet to use the same IP address

Which of the following assures that only authorized users can access and view data?

Confidentiality

Which of the following is true about Docker containers:

Containers optimize the software supply chain

Which network topology offers multipoint connections and direct links between network devices?

Mesh

Daniel is planning to switch his network from IPv4 to IPv6. He currently runs Address Resolution Protocol (ARP) to manage local Media Access Control (MAC) addresses. When he moves to IPv6, what protocol must he use instead of ARP?

Neighbor Discovery Protocol

The Data Link Layer of the OSI model:

Prepares the data to be placed onto the physical link

Network interface controllers (NICs) react to a network collision by:

Retransmitting

Which of the following is typically used for campus backbone connections and building backbone connections?

Router

Which of the following correctly identifies a protocol or application and a common device associated with the Session Layer of the OSI model?

SSH, firewall

Combining or integrating unified communications (UC) into which of the following can shorten sales cycles and increase revenues?

Sales Force Automation [internal & external presales communications]

The Application Layer of the OSI model:

Serves as the primary interface for application software to interact with networks

The Session Layer of the OSI model:

Sets up, manages, and terminates connections between applications on source and destination computers

Ethernet networks use carrier sense multiple access with collision detection (CSMA/CD) to reduce collisions on shared media. When a network interface controller (NIC) wants to transmit data on a network, it listens on the physical media for specific voltage levels or carrier signals. How does the NIC know if another device is already transmitting?

It detects a carrier signal

Your enterprise business has offices in the United States, Spain, and Japan. Which of the following is a communication challenge your company faces?

It is more spread out, time zone difficulty

Docker is often used to containerize legacy applications (previously created/released applications). This is done for the following reasons, except:

It takes no time to do this

__________ developed Ethernet.

Xerox

True or False? One reason why cyber attackers target small businesses is because enterprises tend to use more comprehensive security solutions.

True

True or False? Placing nodes that communicate frequently in the same subnetwork can reduce the overhead required to route packets between the nodes.

True

True or False? Power over Ethernet (PoE) switches can deliver electrical power to IP phones.

True

True or False? Security is one reason to separate and internetwork local area networks.

True

True or False? Segmenting a network into multiple collision domains makes a network more efficient.

True

True or False? The OSI Network Layer provides network IP addressing for packets.

True

True or False? The OSI Transport Layer provides flow control, fragmentation/reassembly, error control, and acknowledgment of delivery.

True

True or False? The OSI model acts as both a reference model and a means of teaching network communications.

True

True or False? The Presentation Layer of the OSI model converts data into standard formats, such as American Standard Code for Information Interchange (ASCII), for application program use.

True

True or False? The Session Layer (OSI Layer 5) is the first layer that connects packets together into conversations.

True

True or False? The business to consumer (B2C) model describes business activities that involve providing products or services directly to end consumers.

True

True or False? The layers of the OSI model are Application, Presentation, Session, Transport, Network, Data Link, and Physical.

True

True or False? The overall procurement process for government agencies follows the request for proposal (RFP) model.

True

True or False? The primary difference between Ethernet II and the IEEE 802.3 Ethernet standards is the frame layout.

True

True or False? The term "3-tier architecture" refers to the separate tiers represented by the client, appServer, and database server.

True

True or False? The user interface is where front-end software interfaces with a computer user.

True

True or False? Unified communications (UC) provides a technology solution to a business problem.

True

True or False? When a web browser initiates a connection, it sends an HTTP request to a web server

True

True or False? When the Time To Live (TTL) value in an IP packet header reaches zero, the current router drops the packet.

True

True or False? Whereas an intranet is a private network within an organization's infrastructure, an extranet is a remotely accessible network typically for business partners and suppliers.

True

True or False? With real-time communications, message delivery does not depend on the recipient being available to receive the message.

True

Technology and unified communications (UC) solutions can help small office/home office (SOHO) businesses solve the following challenges:

UC can help reach new customers, respond to customer needs, leverage limited resources, extending organic communication, provide professional appearance

All of the following are true of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), except:

UDP's primary service is packet routing

Maria is a network analyst for an enterprise. She is creating guidelines for network personnel to apply to business issues that may need a new software application to resolve. Which of the following is the best overall approach?

Understand the business problem, identify a business solution, and then identify a technical solution

A container name must be

Unique

The Linux OS is basically a

file system

To ship a custom image, it must be assigned a

globally unique name

Containers reduce the complexity of the software supply chain by

packaged same way regardless of OS, distribute same way regardless of setup, test same way regardless of platform

If a Docker container is stopped, it can be restarted using the command

start

True or False? The Physical Layer of the OSI model includes services for user programs that interact with the network, such as email software.

False

True or False? The business to government (B2G) model focuses citizens using government websites to make transactions, such as paying taxes.

False

True or False? One communication challenge for government agencies is meeting an increasing number of requirements with shrinking budgets.

True

Containers provide all of the following advantages except:

A better UI for application code

Which IEEE specification was a major driving force to encourage the use of unshielded twisted-pair cabling for workstation connections and dominated early installations?

10Base-T

A network topology is:

A map of the network that shows how devices connect to one another and how they use a connection medium to communicate

Which of the following is a communication challenge experienced more often by government agencies than by businesses?

Addressing demands of paper-based processes, meeting an increasing number of requirements with shrinking budgets, dealing with obstacles from legacy systems

Carl is a network engineer. He is hardening a server to make it less vulnerable to attacks. What is the most secure method of handling open ports?

Apply the deny-all principle and enable only those ports that are needed

Carl works for a government agency. As part of a business impact analysis, he is evaluating what business functions are critical to his agency's ability to remain operational after a disaster. Which of the following aspects of the agency's network would most significantly affect business continuity after a hurricane or flood?

Availability - High; includes disaster recovery plan (DRP)

Isabelle is a network engineer for a small to medium-sized business (SMB). She is evaluating the suitability of the company network to support a new unified communications (UC) system. Which of the following network elements or features has the most impact on the quality of real-time video chat?

Bandwidth

Which two industries share the same primary concerns regarding communications—they must be timely, secure, clear, and reliable?

Banking & Financial Services; Healthcare and Patient Care Services

What allows the Internet Assigned Numbers Authority (IANA) to segment any address space to define larger or smaller networks as needed, giving far more flexibility to allocate networks of virtually any size without wasting large blocks of IP addresses?

Classless Inter-Domain Routing (CIDR)

Which application architecture leverages workstation processing, balances network I/O, and separates processing functions from data?

Client/server

In which application architecture was the application server (appServer) introduced?

Cloud computing/N-tier

On a circuit-switched network:

Collisions and congestion are not issues

Of the following industries, in which is it most common for consumers to shop online for the best price before buying even moderately priced products or services?

Commercial Retail Products & Services

Which of the following is a communication challenge experienced more often by small businesses than enterprise businesses or government agencies?

Competing demands for budget, SBM perception, marketing reach, customer service, limited customer base

True or False? Customers and partners are typically satisfied communicating with businesses via one communication method as long as the business is responsive.

False

True or False? In half-duplex mode, both ends of a connection can communicate simultaneously.

False

True or False? A Network Layer address and a Media Access Control (MAC) address are the same thing.

False

True or False? Air (radio frequency) is not considered a type of network transmission medium.

False

True or False? Because unified communications (UC) systems promote information exchange and messaging, network access control is not important.

False

True or False? Structured wiring systems refer to indoor cabling only.

False

Which of the following industries focuses on protecting PHI?

Health and Patient Care Services

Images are stored in repositories on the Docker

Hub

Which of the following is not true of Internet Protocol version 4 (IPv4)?

IPv4 addresses are 64-bit numbers (IPv4 are 32-bit numbers)

Which of the following is not a way in which unified communications (UC) improves communication efficiency?

Increases the number of messages sent and received

Which of the following assures that only authorized users can modify data?

Integrity

Which of the following is an OSI Layer 3 (Network Layer) protocol that queries the status of devices or services and reports on those that are not available?

Internet Control Message Protocol (ICMP)

Which of the following is an OSI Layer 3 (Network Layer) protocol suite that authenticates and encrypts each IP packet to provide secure IP communication?

Internet Protocol Security (IPSec)

All of the following are true about unified communications (UC) except:

Is not important for a business to be successful (They are)

The Physical Layer of the OSI model:

Is where cabling or other transmission media is needed to transmit signals

Alpine is a Docker image based on the _______ operating system.

Linux

Of the following, what is the easiest way to interconnect two networks?

MAC layer bridge

Arturo is expanding workgroup LANs into departmental LANs. What will dictate the best topology for each LAN?

The amount of traffic that travels between the workgroup LANs

The Presentation Layer of the OSI model:

On the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network.

Regarding the OSI Reference Model, OSI stands for:

Open Systems Interconnection

Each virtual machine requires it's own

Operating system

Which transmission medium has a glass core surrounded by a glass cladding?

Optical Fiber

Which transmission medium uses a technique called wavelength division multiplexing (WDM) for bidirectional and full-duplex communications?

Optical Fiber

In the 1990's, the computer industry shifted from the use of mainframes to

PC's

On a packet-switched network:

Packets are transmitted as individual messages and reassembled by the receiver

Which of the following cloud service models is designed to support application development?

Platform as a Service (Paas)

What maps internal IP addresses to public or external IP addresses?

Port address translation (PAT)

True or False? It is estimated there are more Internet-connected devices, which make up the Internet of Things, than there are people on the Earth.

True

The command to upload an image to a registry so it can be shared with others, is docker image

Push

A small firm wants to use port address translation (PAT) to enable the office computers to access the Internet. The computers use internal private addresses in the range of 192.68.1.100 through 192.68.1.200. The shared public IP address is 172.124.10.10. Computers on this network can send data to and from the internet using the shared public IP address and a _____?

Range of internal, private IP host addresses

Ethernet networks today are __________ to build and maintain.

Simpler and less expensive

Due to limited resources, which of the following has the greatest challenges reaching the customer, managing time, meeting customer needs, and maintaining security?

Small Office/Home Office (SOHO)

Which network topology reduces the average path length by centralizing network traffic, and depends on network hardware electronics (i.e., hub or switch) to terminate physical cabling?

Star

What challenges do enterprise and small businesses have in common?

Study other questions for this... not clear.

Of the following, which is the most convenient method of communicating simple messages quickly?

Text messaging

True or False? Local area network (LAN) switches build Media Access Control (MAC) address tables by examining the source MAC address of every Ethernet frame.

True

True or False? Networks are subject to a maximum distance or path length due to signal attenuation.

True

The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) operates at the

Transport Layer

Which Application Layer threat is typically disguised as a useful program to trick the user into downloading it?

Trojan Horse

True or False? A Media Access Control (MAC) address uniquely identifies each network interface controller (NIC).

True

True or False? A backbone that connects other backbones is a campus backbone.

True

True or False? A challenge for organizations that are geographically spread out is effective communications throughout the organization.

True

True or False? A dual stack operating system supports both IPv4 and IPv6 using two separate network stacks for IP.

True

True or False? A dynamic route is a path to a destination that is discovered at run time, not previously defined.

True

True or False? A hybrid network topology is a network that contains several different topologies.

True

True or False? A port is a number that tells a server what type of service the client is requesting.

True

True or False? A unified communications (UC) system can deny unauthorized contacts and redirect authorized contacts to authorized individuals.

True

True or False? A virtual machine operates just like a physical computer.

True

True or False? An instance of a service listening for traffic on a specific port is called a socket.

True

True or False? An organization with very few people is extremely sensitive to the impact of wasted time.

True

True or False? Because small businesses have only a fraction of the customers of large organizations, the consequences of losing customers are more visible in small businesses.

True

True or False? Campus backbone networks are aggregations of multiple buildings on the same physical campus.

True

True or False? Cloud computing consists of renting someone else's computers and network to run software to support your business.

True

True or False? Cloud computing makes it possible for organizations of any size to lease data center infrastructure and implement an N-tier architecture.

True

True or False? GigE and higher Ethernet LAN trunking drive high-speed applications and time-sensitive protocols to the desktop.

True

True or False? Hyperconnectivity refers to always being online and connected.

True

True or False? IP supports both connectionless and connection-oriented upper layer protocols.

True

True or False? IPv4 addresses are written as four separate 8-bit numbers separated by periods or dots.

True

True or False? In the workplace, one way to avoid information overload is to minimize the amount of information users receive.

True

Which of the following made cloud computing possible?

Virtualization

For the command: $docker container run -d --name helloThere alpine /bin/sh -c "while true; do prinf 'hello there.../n'; sleep 5; done" --name is used to

name the process

For the command: $docker container run -d --name helloThere alpine /bin/sh -c "while true; do prinf 'hello there.../n'; sleep 5; done" -d tells docker to run the container as a

background process

Each image starts with a _________layer. Some examples are: Alpine, Ubuntu, and CentOS

base

The Docker _______ is the primary way that Docker users interact with Docker.

client

Images are templates from which _______ are created.

containers

Docker containers are assigned IDs that are created using SHA-256. SHA-256 is all of the following except

easy to hack

The Docker _____ listens for Docker API requests and manages Docker objects.

daemon

The Docker _____ is a public registry that anyone can use to store images.

hub

The layers of a container image are

immutable (layer cannot ever be changed)

A container has lots of associated data that characterizes its behavior, this is called its metadata. To obtain the metadata for a container use the _____ command

inspect

The command $docker container ls will:

list all running containers on the host system


Conjuntos de estudio relacionados

The Awakening by Kate Chopin (AP LIT)

View Set

Catastrophism / Gradualism / Punctuated Equilibrium

View Set

AAT test 3: Rational Expressions, Exponents, & Radicals

View Set

NET140 TestOut Chapter 8.3 Group Policy

View Set