IST 220 Exam #1

¡Supera tus tareas y exámenes ahora con Quizwiz!

False

A DNS scope is a range of addresses to be assigned to clients when they request an IPv4 IP address

socket

A ______________ consists of both a host's IP address and a process's TCP or UDP port

False

A binary number is written in the base-10 number system, which only uses the numerals 1 and 0.

True

A fire suppression system can include an emergency alert system, portable fire extinguishers, an emergency power-off switch, and suppression agents

Packet

A name for a PDU or Protocol data unit when it is at Layer 3 of the OSI model is called a ____________.

True

A network begins at the demarc and ends at a workstation.

Peer-to-peer model

A network consists of 10 computers, all running Windows 7 Professional. One computer acts as a file server and serves up data to other computers on the network. Which networking model does the network use?

False

A software upgrade is a correction, improvement, or enhancements to software.

True

A software upgrade is a major change to a software package that enhances functionality and feature of the software.

False

A switch manages traffic between two or more different networks

Demarc

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. Where do you take them?

Master License Agreement (MLA)

Documents in detail the work that must be completed for a particular project.

Memorandum of Understanding

Documents the intentions of two or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts

No more than 1 inch of the cable should be exposed.

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

19 23

Equipment Racks come in standard frame sizes, meaning that the front is x inches across. What are the possible sizes?

True

FTP server listens on Port 21...

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

How can you determine the manufacturer of a NIC card based on the MAC address?

False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

32

IP v4 addresses have how many bits and are written as four decimal numbers called octets....

Rack Ears

If you are shopping for a rack switch, what components on the switch tells you it can be mounted to a rack?

True

In a Client-Server Network resources are managed by the NOS

Ring

In a ___________ topology nodes are connected only to its two neighboring nodes... This topology is seldom used in modern networks. A node can only put data on the network when it hold a token. The main factor of why it is rarely used today is due to its slow speed.

Client Server

In a network of 10 computers, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support that it could not support without the upgrade?

False

In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack.

No more than four times the diameter of the cable

In general, how much can a twisted-pair's cable be bent before data transmission may be impeded?

128.0.x.y to 191.255.x.y

In the classful addressing scheme, what range of network addresses is considered a Class B?

HTTP

In the client-server model, what is the primary protocol used for communication between a browser and a Web Server.

Request for Proposal (RFP)

Is a request to vendors to submit a proposal for a product or a service your company wants to purchase.

Service Level Agreement (SLA)

Legally binding contract or part of a contract that defines, in plain language and in measurable terms, that aspects of a service provided to a customer.

Mac Address-Data Link IP Address-Network

Mat the Mac address and IP address to the proper layer.

COM- Commerical NET- Networks ORG- NOn commerical organization Gov-Government

Match Domain suffix with the type of organization. (Pick the best Choice) COM NET ORG GOV

ifconfig-a

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

WAN - Largest LAN-Smallest MAN-MIddle

Order the Networks from Smallest to Largest in Geographical Area

False

Peer-to-Peer Networks are very scalable, and are practical for large installations

False

Physical and Logical topologies are always the same.

Layer 1- Physical Layer 2- Data Link Layer 3- Network Layer 4- Transport Layer 5- Session Layer 6- Presentation Layer 7- Application

Please Match the Layer on left with its name on the right.

False

Port 80 indicates this an HTTPS session.

False

Rack Height is measured in rack bays (RB or B)

False

Removing a header and a trailer from a layer below is called encapsulation.

False

TFTP is a techniques designed to conserve the number of public IP addresses needed by a network.

UTP STP Fiber-optic cable

TIA/EIA recognizes three possible cabling types for horizontal cabling...

False

The 1024 - 65535 range of ports is also known as the "well-known" range.

False

The Session layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

True

The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.

False

The first part of an IPv4 address identifies the host, and the last part identifies the network.

False

The maximum allowable distance for horizontal cabling is 90m.

True

The process of designing, implementing, and maintaining an entire network is called the system life cycle.

TCP and UDP

The two main Transport Layer Protocols are: (Only Need the Abbreviation)

False

There is only one IDF per campus, but there can be many MDF connecting internal portions of the network.

True

Three switches daisy-chained together in a single line is said to use a bus topology

False

UDP (User Datagram Protocol) - makes a connection with the end host, checks whether data was received; called a connection-oriented protocol

True

UDP port 123 is utilized by the Network Time Protocol service.

Wide Area Network (WAN)

WAN is an abbreviation for:

Layer 7 - Application Layer

Web Browsers and Email software operates at what layer of the OSI Model?

True

Well-known ports range from 0 to 1023 and are assigned by IANA.

127.0.0.1

What IP addresses is a loopback IP address?

Email Shared Folders Printers

What can be shared on a network?

255

What decimal number corresponds to the binary number 11111111?

It identifies the e-mail server to be used for e-mail traffic for the domain.

What does the MX record do in a forward DNS zone?

BIND

What is by far the most popular DNS server software available?

The last 24 bits of the MAC address.

What part of a MAC address serves as the extension identifier, or device ID?

TIA/EIA 568

What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?

link local address

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

wiring schematic

What type of diagram show a graphical representation of a network's wired infrastructure.

NSLookup

What utility allows you to query the DNS database from any computer on the network?

Ping

What utility is ues to verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network...

an icon that resembles a brick wall

When creating network diagrams, what icon description typically represents a network firewall?

An icon that is rectangular, which contains four arrows pointing in opposite directions.

When creating network diagrams, what icon description typically represents a network switch?

True

When working with sensitive components, protect against ESD by using an ESD strap

True

When you are responsible for a computer or network, you need to fully understand the impact of any change before you allow that change.

Remote Desktop

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?

Telnet

Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?

POP3

Which email protocol allows an email client to download email messages to the local computer?

Routers Switches Kvm Switch

Which of the following devices are you likely to find in the MDF? Choose all that apply

Cable ties should be pulled tightly to keep cables from moving around in a bundle.

Which of the following is NOT a best practice when performing cable management?

172.16.0.0 through 172.31.255.255

Which of the following is NOT a range of IP addresses recommended for use in private networks?

Port

Which type of address is used at the Transport Layer to identify the receiving application?

The exposure of the cable can cause transmission interference between wires.

Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?

mycompany.com

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

The computer is configured to use DHCP, but was unable to lease an address.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

False

You can permanently assign a dynamic IP address to a device.

SSH (Secure Shell)

You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:22. Assuming your network uses standard port designations, what Application layer protocol handles your transmission?

patch cable

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

Both IPv4 and IPv6 protocols will be used on the network.

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Rack

__________ diagram shows the devices stacked in a rack system and are typically drawn to scale

Patch Panel

__________ is a panel of data receptors which can be mounted to a wall or a rack and which provides a central termination point when many cables converge in a single location

ipconfig /all

n Windows what command can you utilize to display TCP/IP configuration information for each network adapter installed?

False

Any layer of the OSI model can directly communicate with any other layer of the OSI model.

Voltage, Wavelengths, Light

At Layer 1 where it is responsible for sending bits via a wired or wireless transmission it can transmitted as: (Pick 3)

MAC address

At the Data Link Layer, which type of network address is used to identify the receiving host?

False

At the Network Layer, and IP address is used to identify the receiving host.

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

False

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.


Conjuntos de estudio relacionados

HIST256_H5M- AMERICAN HISTORY week2

View Set

Catering and Banquet Organization Exam #1

View Set

PrepU Chapter 39: Fluid, Electrolyte, and Acid-Base Balance

View Set

History -Chapter 12 - Sections 1-3

View Set

BCOM 300W - Chapter 5, "Creating Effective Business Messages"

View Set

Chapter 69: Management of Patients with Autoimmune disorders RV

View Set

PrepU Chapter 46: Gastric and Duodenal Disorders

View Set

COMPTIA A+ - Test Q's 1002 - Software Troubleshooting

View Set