Google IT Support Cert - Computer Networking - Comprehensive Quizlet

¡Supera tus tareas y exámenes ahora con Quizwiz!

A domain name is the term used for something that can be resolved by ____?

Domain name system (DNS)

Which protocol is used to communicate errors that may occur across a network?

Internet Control Message Protocol (ICMP)

Which protocol is known as the heart of the internet?

Internet Protocol

Which protocol is responsible for getting data from one node to another?

Internet Protocol

TRUE OR FALSE - Cloud computing is the concept of a physical machine and a logical machine abstracted away from each other.

True

TRUE OR FALSE - DNS is a global and highly distributed network service that resolves strings of letters into IP addresses.

True

TRUE OR FALSE - For reliability, copper cable would be preferable.

True

TRUE OR FALSE - IP addresses belong to the networks, not the devices attached to those networks.

True

In its shortened form, " ::1 " is the loopback address for IPv6 (T/F)

True

The IPv6 loopback address is _____.

0000:0000:0000:0000:0000:0000:0000:0001

At the very lowest level, all computers really understand are ____?

1 and 0

Choose all of the frequencies that wireless networks typically operate on. -5Ghz -2.4Ghz -1.544Ghz -88Mhz

-5Ghz -2.4Ghz

Which of the following statements accurately describe the differences between a hub and a switch? Select all that apply. -A hub causes larger collision domains. -A switch remembers which devices are connected on each surface, while a hub does not. -Hubs are more sophisticated versions of switches. -A hub is a physical layer device, and a switch is a data link layer device.

-A hub causes larger collision domains. -A switch remembers which devices are connected on each surface, while a hub does not. -A hub is a physical layer device, and a switch is a data link layer device.

What are the four things that all computers need configured in order to operate on a modern network? Check all that apply. -A subnet mask -An IP address -An NTP server -A TCP port -A name server -A default gateway -A MAC address

-A subnet mask -An IP address -A name server -A default gateway

How many bits are reserved for the Transmission Control Protocol (TCP) flags?

6

For all IPv6 addresses, the network ID is always the first ______ bits.

64

What's the standard number for a TTL field?

64

An example of something that operates at the application layer is: UDP A router TCP A web browser

A web browser

For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used? Check all that apply. -Datagrams -IPv4 Tunnels -Packets -IPv6 tunnels

-Datagrams -IPv6 tunnels

What two benefits are a result of configuring a wireless mesh network? Check all that apply. -WiFi protected setup -Range -Ad-hoc configuration -Performance

-Range -Performance

Which of the following are protocols used in the Transport layer? Check all that apply. -Ethernet -TCP -UDP -IP

-TCP -UDP

Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below. -The session layer -The encryption layer -The interconnection layer -The compression layer -The presentation layer

-The session layer -The presentation layer

Select all statements that are true of cable internet connections. -They're wireless connections. -They're broadband connections. -They're shared bandwidth connections. -They're dial-up connections.

-They're broadband connections. -They're shared bandwidth connections.

Please select all valid TCP control flags. -URG -WAIT -RST -LISTEN -CLOSE -ACk

-URG -RST -ACK

When using the netcat command to test a network port, which option will provide output that is not useful for scripting, but is useful for the human eye?

-v

An IPv6 address is how many bits long?

128

IPv6 addresses are ________ bits in size.

128

How many root servers are there?

13

How many bits are in the checksum field in a Transmission Control Protocol (TCP) header?

16

How many bits are used to direct traffic to specific services running on a networked computer?

16

What size is an Internet Protocol (IP) v6 payload field?

16-bit

A complete Fully Qualified Domain Name (FQDN) is limited to how many characters?

255

A fully qualified domain name can contain how many characters?

255

IP addresses are a ______ bit long numbers made up of four octets, and each octet is normally described in decimal numbers.

32

How many address fields does an 802.11 header have?

4

The total number of IPv4 addresses is approximately:

4.2 billion

One of Level 3's public DNS servers is ____________.

4.2.2.3

How many bits does WEP (Wired Equivalent Privacy) use?

40

What port on a name server is used for User Datagram Protocol (UDP) name request packets?

53

Which of the options below represents the correct & most fully compressed version of the IPv6 address: 7d2b:00a9:a0c4:0000:a772:00fd:a523:0358

7d2b:a9:a0c4:0:a772:fd:a523:358

One of Google's public DNS servers is 8.8.8.8. The other one is ______.

8.8.4.4

How many zeros are found at the beginning of an Internet Protocol (IP) v6 address that correlate to a v4 address?

80

The traditional port for HTTP or unencrypted web traffic is port _____.

80

What is a cyclical redundancy check?

A mathematical calculation used to ensure that all data arrived intact

Wireless networks configured where nodes all speak directly to each other are known as what?

Ad-hoc

Which form of Digital Subscriber Line (DSL) features differing upload and download speeds?

ADSL

In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?

Ad-hoc

Select all that are true. -One domain name can point to one IP. -Many domain names can point to the same IP. -One domain name can point to many IPs.

All are true.

An A Record contains what?

An IPv4 address

The number range of how many IPv6 domain address which can be provided is ____.

An Undecillion

During the name resolution process, which technique is used to avoid congestion when querying a server?

Anycast

Modems communicate data by using which method?

Audible wavelengths

Which allocation method can be used with a Dynamic Host Configuration (DHCP) server to assign the same address to the same machine if possible?

Automatic

You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determine the most optimal path to forward the traffic?

Border Gateway Protocol (BGP)

What does a wireless LAN (WLAN) act as to a wired network?

Bridge

The transmission method that sends data to every device on a LAN is known as a _____ transmission.

Broadcast

A DNS record that's used to redirect traffic from one domain name to another is known as a _______ record.

CNAME

Which connection technology uses what is known as a CMTS?

Cable Internet

Within the Ethernet frame, one of the most widely used methods of detection of errors in data is known as _______?

Checksum

Which of the following IP address classes do NOT exist?

Class Z

What is the name of the provision of services based around hardware virtualization?

Cloud computing

__________, generally used by cable television delivery into a person's home, are capable of transmitting much more data than what was required for TV viewing.

Coaxial cables

A network segment where only one device can communicate at a time is known as a _____.

Collision domain

What type of cable communicates binary data by changing the voltage between two ranges?

Copper

When an electrical pulse on one wire is accidentally detected on another nearby wire, this is known as _____.

Cross talk

The process by which a client configured to use DHCP attempts to get network configuration information is known as _________________.

DHCP Discovery

The final step of the DHCP Discovery process is known as ______.

DHCPACK

The more accurate name for a modem used for a DSL connection is a ______.

DSLAM

Which layer abstracts away the need for any other layers to care about what hardware is in use?

Data Link Layer

One of the benefits of Cloud Storage is protection against __________?

Data loss

In a TCP header, the __________ is the port of the service the traffic is intended for.

Destination port

Which of the following is NOT one of the four of the most common broadband solutions available today? Cable broadband Digital Subscriber Lines Dial-up Internet Fiber connections

Dial-up Internet

TRUE OR FALSE - T-carrier technologies were originally invented by AT&T in order to transmit multiple phone calls over a single link.

Disaster relief professionals often use an ____________ to communicate with each other while they perform search and rescue efforts.

A Transmission Control Protocol (TCP) connection is in working order and both sides can send each other data. What is the TCP socket state?

ESTABLISHED

Which of the options below represents the correct & most fully compressed version of the IPv6 address: 00eb:0000:0000:0000:d8c1:0946:0272:879

Eb::d8c1:946:272:879

The ping utility sends what message type?

Echo Request

One of the most popular Software as a Service (SaaS) examples is ________?

Email

The protocol most widely used to send data across individual links is known as _______?

Ethernet

TRUE OR FALSE - In computer logic, a zero represents true and a one represents false.

False

The following IP address is fully compressed to the shortest form possible: 9930:cafa:0000:0052:04cc:7b7a:0037:27e6 → 9930:cafa:0:052:4cc:7b7a:037:27e6. (T/F)

False

For delivering data at a faster speed, which type of cable would be preferable?

Fiber

________ allows for data transmissions to travel much farther without degradation of the signal.

Fiber

FTTP stands for _______.

Fiber to the Premises

The TCP control flag FIN stands for ____?

Finish

A ________ is just a device that blocks traffic that meets certain criteria.

Firewall

A device that blocks traffic that meets certain criteria is know as a ________.

Firewall

The phrase TCP/IP represents how many protocols?

Four

What's the difference between full and half duplex?

Full duplex allows communications in two directions at the same time; half duplex means that only one side can communicate at a time.

A ________ is a way for two devices to ensure that they're speaking the same protocol and will be able to understand each other.

Handshake

Which Internet Protocol (IP) v6 field is identical in purpose to the TTL field in an IPv4 header?

Hop Limit

A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used?

Hybrid

Administration and definition of TLDs are handled by a non-profit organization known as _______.

ICANN

The organization responsible for DNS at a global level is ________.

ICANN

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

ICMP

The protocol used to communicate network errors is known as __________.

ICMP

When troubleshooting Domain Name System (DNS) problems, which helpful feature do public servers usually support?

ICMP echo requests

Which of the following is an example of a network layer (layer 3) protocol? (One answer) -UDP -TCP -IP -Ethernet

IP

The Internet Assigned Numbers Authority (IANA) has been in charge of distributing ________ since 1988.

IP addresses

ICMP stands for ________.

Internet Control Message Protocol

What is the purpose of DNS round robin technique?

It's to balance traffics.

What is the type of modulation used by twisted pair cable computer networks known as?

Line coding

What does LAN stand for?

Local area network

An Internet connection problem for customers is found to be outside a carrier's regional office. As a result, which area needs troubleshooting?

Local loop

The physical address assigned to a device by a manufacturer is also known as a _____ address?

MAC

The resource record type MX stands for ____?

Mail exchange

Which configuration is considered to be a common way to increase security in a wireless network?

Media Access Control (MAC) filtering

Ones and zeros are sent across those network cables through a process called ________?

Modulation

What process sends ones and zeroes across network cables?

Modulation

____ is technology to help keeps network secure and preserve precious IP address space.

NAT

What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model does IP use?

Network

Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes?

Network

As an IT decision maker, you plan to satisfy business needs by using software as a service. Which option do you deploy?

Office 365

Cellular network towers are configured in such a way so that they avoid what type of problem?

Overlap

Cat5 and Cat6 cabling refer to which reference model layer?

Physical

What's the right order of the TCP/IP Five-layer network model?

Physical Layer > Data link Layer > Network Layer > Transport Layer > Application Layer

Using the ________ tool is a way to determine if you can reach a certain computer from another one.

Ping

The Public Switched Telephone Network or PSTN is also sometimes referred to as POTS. What does the acronym POTS stand for?

Plain Old Telephone Service

In cloud computing, the acronym PaaS stands for ____?

Platform as a Service

PaaS stands for ______.

Platform as a Service

What technique allows for inbound traffic through a NAT?

Port forwarding

The transport layer handles multiplexing and demultiplexing through what type of device?

Ports

A defined set of standards that computers must follow in order to communicate properly is called a _______?

Protocol

A defined set of standards that computers must follow in order to communicate properly is known as a _____.

Protocol

What is the most common plug used with twisted pair network cables?

Registered Jack 45

With TCP, a source port is needed so that when the web server replies, the computer making the original request can send this data to the program that was ___________?

Requesting it

An IT engineer is planning a website upgrade with load balancing features. What technology is used?

Reverse proxy

There are 13 _____ name servers.

Root

What ordering of TCP flags makes up the Three-way Handshake?

SYN, SYN/ACK, ACK

Office 365 Outlook is an example of _______.

SaaS

In what order will the Transmission Control Protocol (TCP) generally send all segments?

Sequential

Cable Internet access can be described with which feature?

Shared bandwidth

In a TCP header, a ___________ is a high numbered port chosen from a special section of ports known as ephemeral ports.

Source port

Which field in a Transmission Control Protocol (TCP) header is chosen from ephemeral ports?

Source port

Which device is more common today, a network switch or a network hub?

Switch

Which one of the following technology would you use if your manager asked you to configure the network setting for every desktop in your company?

Switch

The TCP control flag SYN stands for ____?

Synchronize

The most common example of a connection-oriented protocol is _____. -IP -UDP -TCP

TCP

On Windows, one of the tools you can use to verify connectivity to a specific port is ________.

Test-NetConnection

What does a value of one in an ACK control flag represent?

The acknowledgement number field should be examined.

Where is the Start Frame Delimiter (SFD) found in an ethernet frame?

The last byte of the preamble

In the five-layer network model, at which layer are protocols first introduced?

The data link layer

You need to identify the manufacturer of a network interface. Where will you look for this information?

The first three octets of a Media Access Control (MAC) address

In the early years of the Internet, the basic infrastructure used was ____?

The public telephone network

Any given domain name has how many primary parts?

Three

The address class system is a way of defining how the global IP address space is divided. How many primary types of address classes exist?

Three

.com, .net, .edu are known as ____.

Top level domains

_________ is a utility that lets you discover the paths between two nodes and provides information about each hop along the way.

Traceroute

In the transport layer, which protocol is used to get data to the right application?

Transmission Control Protocol

T1 is short for __________.

Transmission System 1.

TRUE OR FALSE - In most cases, static IP addresses are reserved for servers and network devices, while dynamic IP addresses are reserved for clients.

True

TRUE OR FALSE - In network layered models, the protocols at each layer carry the ones above them in order to get data from one place to the next.

True

TRUE OR FALSE - Network address translation takes one IP address and translates it into another.

True

TRUE OR FALSE - TCP, as a protocol, is universal in how it's used since every device speaking to TCP protocol has to do this in the exact same way for communications to be successful.

True

TRUE OR FALSE - The process by which a client configured to use DHCP attempts to get network configuration information is known as DHCP discovery.

True

TRUE OR FALSE - You can tell what address class an IP address belongs to just by looking at it.

True

The following IP address is fully compressed to the shortest form possible: 0e56:11c2:0e75:8d23:3528:7e0d:419b:bdce → e56:11c2:e75:8d23:3528:7e0d:419b:bdce (T/F)

True

Binary is made up of how many parts?

Two

What transport layer protocol does DNS normally use?

UDP

What is the biggest difference between TCP and UDP?

UDP is connectionless.

What type of transmission will have a zero in a special bit in the destination Media Access Control (MAC) address?

Unicast

The technique that allows you to have multiple logical LANs operating on the same physical equipment is known as a _____.

VLAN

VPN stands for _______.

Virtual Private Network

The original and flawed wireless security protocol is known as _____.

WEP

What type of scenario should you use the User Datagram Protocol (UDP)?

When you are streaming a video

WPA stands for _______.

WiFi Protected Access

WAN stands for ______________.

Wide Area Network.

Counting in Binary starts with which digit?

Zero

A hybrid cloud is ________________.

a combination of a public cloud and a private cloud

In a WAN, the area between a demarcation point and the ISP's core network is known as ___________.

a local loop

Two-factor authentication is_________________________.

a method where you need more than a username and a password.

The term broadband is used to refer to any connectivity technology that isn't ________?

dial-up Internet

The acronym DNS stands for ____?

domain name system

Networks can connect a new device and an IP address can be assigned to it automatically through a protocol known as __________?

dynamic host configuration protocol

Different WiFi 802.11 standards generally use the same basic protocol, but might operate at different ___________.

frequency bands

The IPv6 header field that indicates how many routers can forward a packet before it's discarded is called the ________.

hop limit field

A piece of software that runs and manages virtual machines is known as a __________.

hypervisor

A tech uses the netcat tool on a Linux system. Of the choices, which has proper syntax?

nc google.com 80

TCP is a protocol that's reliant on _______?

network administrators

A DNS resolver tool available on all major desktop operating systems is __________.

nslookup

Which command line tool would you use to find the IP address for a given domain name?

nslookup

Ports 1024-49151 are known as ______ ports.

registered

A point-to-point VPN is also known as a ______________.

site-to-site VPN

VPNs are known as a _____ protocol.

tunneling

The very first field in an IPv6 header is the _______.

version field

IANA has primarily been responsible with assigning address blocks to five regional internet registries (RIR). A tech needs to research address blocks assigned in the United States. Which RIR should the tech contact?

ARIN

A device involved in a Transmission Control Protocol (TCP) connection is ready to close the connection. The other device in the connection agrees. What has occured?

Four-way handshake

Which of the following are examples of layers of our five-layer network model? Select all that apply. -Transport Layer -Presentation Layer -Application Layer -Physical Layer

Transport Layer Application Layer Physical Layer

A wireless channel is ____________.

a portion of a frequency band.

NAT addresses concerns over the dwindling IPv4 address space by ___________________.

allowing computers using non-routable address space to communicate with the Internet.

HTTP is an example of a(n) ______ layer protocol.

application

The "www" portion of a domain is known by which of the given options? Check all that apply. -Host name -Top Level Domain (TLD) name -Subdomain -Dynamic Host Configuration Protocol (DHCP)

-Host name -Subdomain

How fast is a T1 line?

1.544 Mb/sec

Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field?

16 bits

Network Address Translation (NAT) is typically implemented with which hardware devices? Check all that apply. -Firewalls -Hub -Routers -Switches

-Firewalls -Routers

When using Fixed Allocation DHCP, what's used to determine a computer's IP?

A MAC address

What's the difference between a client and a server?

A client requests data, and a server responds to that request.

What's a router?

A device that knows how to forward data between independent networks

A DNS TTL determines what?

How long a DNS entry is allowed to be cached

You have installed a device at the physical layer. All of the systems you connect to this device will talk to each other at the same time. What have you installed?

Hub

A company moves a popular website to a new web host. Which of the following will change as a result?

Internet Protocol (IP) address

MX stands for ________.

Mail exchange

What service acts on behalf of a client in order to access another service?

Proxy Server

Another term for POTS, or the Plain Old Telephone System, is _______________.

Public Switched Telephone Network.

Application layer data lives in the _____ section of the transport layer protocol.

data payload

The rate at which a dial-up connection can send data across a telephone wire is known as a _____ rate.

baud

A baud rate is a measurement of the number of ______________________.

bits that can be sent across a telephone line every second.

A proxy is something that _______________________.

communicates on behalf of something else.


Conjuntos de estudio relacionados

Subject, Possessive, and Object Pronouns/ Direct and Indirect Objects

View Set

MSK - Histology of Cartilage, Bone, and Skin

View Set

pharmacology practice assessment A 2016

View Set

Michigan State Insurance Exam 6/3/2021

View Set