Info and Network Security Chapter 2
You are examining a list of IP addresses. Some are internal, someexternal, and some are not valid. Which of the following is not a validIP address? 127.0.0.1 131.156.5.2 295.253.254.1 245.200.11.1
295.253.254.1
Unshielded twisted-pair cable capable with a specification of 100MHz/100 Mbps is also called Category ________. 5 6 7 2
5
If an IP address has the number 194 in the first octet, it is a class_______ address. C B D A
C
What class of address is IP address 193.44.34.12? A D B C
C
What protocol translates web addresses into IP addresses? SMTP TFTP DHCP DNS
DNS
Which TCP/IP protocol operates on port 53 using UDP and translatesURLs into Web addresses? HTTP DNS SMTP FTP
DNS
Which layer of the OSI model is divided into two sublayers? Session Network Presentation Data link
Data link
The IP command-line command to determine your computer's IPaddress, subnet mask, and default gateway is ping True False
False
The TCP protocol works at the network layer of the OSI model. True False
False
The first four bytes of the MAC address identify the vendor. True False
False
The name you type into a browser's address bar, such as www.microsoft.com, is known as the IP locator. True False
False
Which TCP/IP protocol operates on port 80 and displays web pages? HTTP FTP SMTP DNS
HTTP
Mohammed needs to open a firewall port so that web traffic can bepassed through the firewall. What protocol is used for web pages, andon which port does it work? HTTP, port 21 DHCP, port 21 DHCP, port 80 HTTP, port 80
HTTP, port 80
Which of the following is a unique hexadecimal number that identifiesyour network card? NIC accress MAC address NIC ID MAC ID
MAC address
Gunther is setting up encrypted remote communications so that theserver administrators can remotely access servers. What protocol isused for remotely logging on to a computer in a secure manner? SSH SMTP Telnet HTTP
SSH
The IP address 127.0.0.1 always refers to your what? Self Nearest router ISP Nearest NAP
Self
An IP version 4 address consists of four numbers, separated by dots.Each number is called a(n) ________. Subnet Bit CIDR Octet
Octet
A(n) __________ hides the internal network's IP address and presentsa single IP address to the outside world. Intrusion detection system Proxy server Network Monitor Firewall
Proxy server
You are assigned with attaching connectors to segments of cable.What type of connector is used with network cables? RJ-85 RJ-12 RJ-11 RJ-45
RJ-45
Which device is used to boost a signal? Repeater Hub Switch Router
Repeater
Which device can relay packets from one network to another and isusually programmable? Hub Switch Router Repeater
Router
Which of the following is a device used to connect two or morenetworks? NIC Hub Router Switch
Router
Which TCP/IP protocol operates on port 25 and sends email? DNS FTP SMTP HTTP
SMTP
What protocol is used to send email, and on what port does it work? POP3, port 110 SMTP, port 10 SMTP, port 25 POP3, port 25
SMTP, port 25
Which device can connect many computers and sends data only out of one port based on MAC address? Switch Repeater Router Hub
Switch
You are explaining the history of networking to a group of freshmenstudents. What did Vince Cerf invent? Email The World Wide Web The first computer virus. TCP
TCP
You are explaining the history of networking to a group of freshmenstudents. What did Tim Berners-Lee invent? The World Wide Web Email The first computer virus TCP
The World Wide Web
How big is a TCP packet header? The size depends on the data being sent. The size is always 20 bytes. The size depends on the protocol being used. The size is always 40 bytes.
The size is always 20 bytes.
Sheryl is explaining the OSI model to new technicians at her company.She is trying to explain what protocols operate at the various layers ofthe OSI model. At what layer of the OSI model does TCP operate? Network Data link Transport Application
Transport
A host is a machine with data on it, to which you can connect. True False
True
MAC addresses are unique addresses for each NIC. True False
True
No protocols operate at the physical layer of the OSI model. True False
True
The notation used to perform variable-length subnet masking for IPaddresses is CIDR. True False
True
The session layer of the OSI model provides the mechanism tomanage the dialogue between end-user application processes. True False
True
Which of the following was one of the three universities involved in theoriginal distributed network setup by a government agency? UC Berkeley Princeton MIT Harvard
UC Berkeley
Malek is purchasing cable to use in setting up small office networks.He wants to stock up on commonly used cable. What type of cable domost networks use? Phone cable Net cable STP UTP
UTP
Internet addresses in the form of www.chuckeasttom.com are calledwhat? Uniform address identifiers User-accessible web addresses Uniform resource locators User-friendly web addresses
Uniform resource locators
What type of cable is used in most networks? Shielded untwisted-pair Unshielded twisted-pair Shielded twisted-pair Unshielded untwisted-pair
Unshielded twisted-pair
Juan has just installed a new T1 line into a doctor's office. The doctor'sfront desk receptionist has asked what speed they can expect. A T1line sends data at what speed? 1.54Mbps 56.6Kbps 100Mbps 155Mbps
1.54Mbps
What is the binary equivalent of the decimal number 240? 11111100 11111110 11110000 11111000
11110000
Which U.S. government agency created the distributed network thatformed the basis for the Internet? Central Intelligence Agency Advanced Research Project Agency NASA Department of Energy
Advanced Research Project Agency
If an IP address has the number 191 in the first octet, it is a class______ address. C A D B
B
Which TCP/IP protocol operates on ports 20 and 21 and is used fortransferring files between computers? HTTP DNS FTP SMTP
FTP
The IP command-line command to determine the number of hops ittakes to get from your computer to its destination is ping True False
False
John is trying to simply connect three computers in a small network.He does not need any sort of routing capability and is not concernedabout network traffic. What is the simplest device for connectingcomputers? Hub Router NIC Interface
Hub
Which device can connect many computers and sends packets outevery port? Repeater Router Switch Hub
Hub
John is working with command-line utilities to gather diagnosticinformation about a computer that cannot connect to the network.Which utility provides information about a machine's networkconfiguration? Tracert IPConfig MyConfig Ping
IPConfig
Sharice is trying to teach a new technician basic networking terms.What should she tell this new technician NIC stands for? Network Interaction Card Network Interface Card Network Interaction Connector Network Interface Connector
Network Interface Card
What is the name for the point where the backbones of the Internetconnect? Routers Switches Network access point Connectors
Network access point
The IP utility used to test connectivity (e.g. reachable) with a remotehost is _______. CIDR tracert ping whois
ping