CTS 110 Network Essentials Module 1 to Module 13 Quiz for Network+ Guide to Networks 8th Edition

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the approximate cost of the network diagram app called Draw.io?

$0

Select the two main protocols that run at Layer 3 of the OSI Model.

- ICMP - IP

ARP works in conjunction with IPv4 to discover the _______________ address of a node on the local network and maps those addresses to _________________ addresses.

- MAC - IP

Select the two main protocols that run at Layer 4 of the OSI Model.

- UDP - TCP

Which of the following are advantages of a Client-Server network model? (Choose 3)

-They are more scalable. -Access to multiple shared resources can be centrally granted to a user or group of users. -User accounts and passwords are assigned in one place.

Which of the following are advantages of peer-to-peer networks (Choose 3)

-They are simple to configure. -They are good for networks that support fewer than 15 computers. -They are often less expensive to set up and maintain.

Select the two main protocols of the Transport layer.

-UDP -TCP

A safety measure that allows access during a failure is called ________ and a safety measure that denies access during a failure is called and a safety measure that denies access during a failure is called ________.

-fail open -fail close

Decimal and Binary values can also be represented by Hex characters. What are the valid Hex characters?

0-9, A-F

Convert Decimal 20 to Binary. Make sure you list all eight bits.

0001 0100

When a DHCP server gives a client an IP address, it sets a time limit, or lease time, on the IP address. In about 30 words, explain: 1 - What happens at the end of the lease time. 2 - What happens if the lease time is too short. 3 - What happens if the lease time is too long. 4 - Include a suggested low and high lease time. 5 - What type of office can benefit from a longer lease time. 6 - What type of office can benefit from a shorter lease time.

1 - At the end of lease time, the IP address expires and is now available to a new client. 2 - If the lease time is too long the network will suffer exhausted DHCP scope and no new clients can join. 3 - If the lease is too short, network availability will be disruptive. 4 - Lease times range from 2 hours to 8 days. 5 - Longer lease times are better for smaller offices without a lot of growth. 6 - Short lease times are better for larger networks where clients log on and off frequently.

ARP tables might contain two different types of entries. 1 - What are they, and 2 - How are they created?

1 - Dynamic and static are the two entries for ARP tables 2 - Static are entries that do not change as someone entered them in manually. Dynamic entries are created by a client requesting an ARP.

Which of the following IP addresses would be a loopback IP address?

127.0.0.1

An MTU is the maximum transmission unit, or the largest size of a frame, in bytes, that routers in the path will allow. What is the layer 2 default MTU?

1500 bytes

The APIPA addresses are from ___________ to ______________.

169.254.0.1 to 169.254.255.254

Which IPv4 addresses are valid? (Choose 3)

192.168.4.64 74.122.199.254 1.22.146.5

Which IPv6 addresses are valid? (Choose 3)

2001:5af:2::56:3d4 2001:98:0045:0000:0001::2 FE0:201:95af::32ab:56:3d4

A MAC address is typically written as hex. Write a valid MAC address in Hex.

30:65:EC:6F:C4:58

An IPv4 address has ________ bits and an IPv6 address has __________bits.

32 bits for IPv4 address 128 bits for IPv6 address

A MAC address is ___ bits.

48

Write the Hex character for binary 1010.

A

In a DNS zone, what type of record holds the name-to-address mapping for IPv4 addresses?

A record

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

Computers store values as an electrical charge (binary 1) or no electrical charge (binary 0). Each binary value is called a bit. What is a group of eight bits called?

Byte

A good naming convention for computers in classroom 223 in the CALT building on the Arnold Campus would be:

CALT223-01, CALT223-02, CALT223-03

Which organization set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices?

Cisco

List the Private address range for each class of IPv4 addresses:

Class A range: 10.0.0.0 - 10.255.255.255 Class B range: 172.16.0.0 - 172.31.255.255 Class C range: 192.168.0.0 - 192.168.255.255

List the range of the first octet of Class A, Class B, and Class C IPv4 addresses.

Class A: 1-126 Class B: 128-191 Class C: 192-223

Match the Class with the Network and Host portion for IP addresses.

Class A: N.H.H.H Class B: N.N.H.H Class C: N.N.N.H

Match the function to the Layer 4 Protocol.

Connection-oriented: TCP Sequencing: TCP Acknowledgment: TCP Flow control: TCP Three-way-handshake: TCP Guarantees delivery: TCP Connectionless: UDP Good for live audio or video: UDP

Convert Binary 1101 0111 to Hex.

D7

Match the following terms with their definition.

Entry Facility: Location where an incoming network, such as the Internet, connects with the school or corporate network Demark point: Device that marks where a telecommunications service provider's network ends and the organization's network begins MDF: Centralized point of interconnection for an organization's LAN or WAN IDF: Provides an intermediate connection between MDF and end-user equipment on each floor and in each building KVM: Switch that connects to a single console to provide central control portal for all device on the rack

TCP transmissions continue until a specific flag bit is set to 1. Which flag is this?

FIN

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

False

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.

False

IPv4 and IPv6 use the same packet format and length.

False

Sensitive electronic components can not be damaged by static electricity.

False

Telnet is a secure protocol used to "remote in" or control a computer remotely.

False

The TCP header includes a Source port and a Destination port. The UDP header does not include either of these.

False

According to the standard for diagram symbols, what is the following device?

Firewall

Match the two main Web service protocols and whether the protocol is Secure or Unsecure

HTTP-Unsecure HTTPS-Secure

You need to check connectivity to Cengage so you open a browser window and type "ping cengage.com" in a Command Prompt. What Layer 3 protocol does ping use?

ICMP

The Network layer adds ___ addresses.

IP

Typically a Switch operates at layer 2 of the OSI model. However, small organizations, such as a SOHO, can purchase a switch that also interprets Layer 3 data and works much like a router. What is this device called?

Layer 3 Switch

Match the OSI layer with the address it adds to the data from the upper layers of the OSI model.

Layer 4: Port address Layer 3: IP address Layer 2: MAC address

Match the OSI Layer and the PDU:

Layer 7, 6, and 5: Payload or Data Layer 4: Segment Layer 3: Packet Layer 2: Frame Layer 1: Bit or transmission

List the seven layers of the OSI model in order - layer 1 at the bottom and Layer 7 at the top.

Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link Layer 1: Physical

Match the router function with a router.

Located inside networks within the same autonomous system: Core router or interior router Connect an autonomous system with an outside network, also called an untrusted network: Edge router or border router Refers to any router outside the organization's AS, such as a router on the Internet backbone: Exterior router

The Data Link layer adds ___ addresses.

MAC

My computer in the CALT building of AACC's main campus has an IP address of 10.0.16.141. I am requesting the Google home page. Because the Source IP address (my computer) is private it will need to be changed to AACC's public IP address at the router. The service that changes the IP address before the packet is sent out to the Internet is called _____.

NAT

To attach to a network a computer requires a NIC. NIC stands for (three words) [ans1].

Network Interface Card

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

No more than 1 inch of the cable should be exposed.

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

Which of these area networks is the smallest by geographic size:

PAN

Periodically, we will be responsible for software and hardware changes. Match the terms below with their definition

Patch: A correction, improvement, or enhancement to software which corrects bugs or add minor enhancements Upgrade: A major change to a software package that enhances functionality and features of the software Rollback: The process of reverting to a previous version of software

Of the well-known TCP and UDP ports, which two carry DHCP traffic?

Port 67 Port 68

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

Port numbers

Good documentation includes business documents. Match the business documents below with their definition.

RFP: Request to vendors to submit a proposal for a product or service MOU: List the intentions of two or more parties to enter into a binding agreement, or contract SOW: A detailed list of the work that must be completed for a particular subject SLA: A legally binding contract or port of a contract that defines the aspects of a service MSA: A contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements MLA: Grants a license from a creator, such as a software producer, to a third party for the purpose of marketing the products to consumers

According to the standard for diagram symbols, what is the following device?

Router

What mail protocol is used to send mail messages to a server?

SMTP

An Application layer utility program called __________ monitors and gathers information about network traffic and can alert network administrators about adverse conditions.

SNMP

TCP uses a three-way handshake to establish a session before TCP transmits data. Select the transmissions of the three-way handshake.

SYN, SYN/ACK, ACK

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

Sliding-window

Match the seven troubleshooting steps with the step number.

Step 1: Identify the problem and its symptoms Step 2: Establish a theory of probable cause Step 3: Test your theory to determine the cause Step 4: Establish a plan for resolving the problem Step 5: Implement the solution or escalate the problem Step 6: Verify functionality and implement preventive measures Step 7: Document findings, actions, and outcomes

According to the standard for diagram symbols, what is the following device?

Switch

The connectionless IP protocol relies on what other protocol to guarantee delivery of data?

TCP

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address.

How can you determine the manufacturer of a NIC based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

VoIP is

The use of any network to carry voice signals using TCP/IP protocols

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

True

Fiber-optic cable comes in two types: single-mode fiber (SMF) and multimode fiber (MMF).

True

In a Peer-to-Peer network model, each computer's operating system is responsible for controlling access to its resources.

True

Layer 2 is the only layer of the OSI model that adds a header and a trailer to the payload it inherits from the layer above it.

True

Network Diagrams are graphical representations of a network's devices and connections.

True

Port 123 is utilized by the Network Time Protocol service.

True

RDP is a secure protocol used to "remote in" or control a computer remotely.

True

Routers work at layer 3. They join two or more networks and pass packets from one network to another.

True

SSH is a secure protocol used to "remote in" or control a computer remotely.

True

The TIA/EIA standard for wall jacks in a work area requires that at least one outlet be provided for data and one for voice.

True

The process of designing, implementing, and maintaining an entire network is called the System Life Cycle.

True

When TCP sends data, the sequence numbers will be increased by the number of bits included in each received segment, as confirmation that the correct length of message was received. This new number (sequence number plus number of bits in the segment) will become the acknowledgment number for the return message.

True

When using IPv6, two or more nodes on the same link are said to be neighbors.

True

To rollback or reverse an operating system patch you should

Use the patch's automatic uninstall utility

VoIP stands for [ans].

Voice over Internet Protocol

Which of these area networks is the largest by geographic size?

WAN

According to the standard for diagram symbols, what is the following device?

Workstation

Nmap was originally designed for Linux as a command-line utility but has since been expanded for compatibility on several other OSes. What is the name of the GUI front end that is available for the Nmap utility?

Zenmap

A/an [ans] is a central conduit that connects the segments of a network. The arrows are pointing to the central conduit.

backbone

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

ifconfig -a

On a Windows system, what command can you utilize to display TCP/IP configuration information for each network adapter installed?

ipconfig /all

Below is a [top] topology.

mesh

Fill in the command that produced the following output. Be specific. In other words, you must include everything that would be typed in Command Prompt. Pinging google.com [142.250.73.206] with 32 bytes of data: Reply from 142.250.73.206: bytes=32 time=30ms TTL=54 Reply from 142.250.73.206: bytes=32 time=32ms TTL=54 Reply from 142.250.73.206: bytes=32 time=38ms TTL=54 Reply from 142.250.73.206: bytes=32 time=30ms TTL=54 Ping statistics for 142.250.73.206: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 30ms, Maximum = 38ms, Average = 32ms

ping google.com

Below is a [top] topology.

ring

A/an _______ manages traffic between two or more networks and helps find the best path for traffic.

router

Below is a [top] topology.

star

What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?

wiki

What type of diagram is a graphical representation of a network's wired infrastructure?

wiring schematic


Conjuntos de estudio relacionados

Engine size and performance measurements

View Set

UFC1 - Chapter 4 Activity based Costing

View Set

Peds Exam 4 Cleft lip/Cleft Palate

View Set

Chapter 21: Product Development and Distribution

View Set