Network Ch.3, Network+ Ch3 quiz, Networking Final Quizlet

¡Supera tus tareas y exámenes ahora con Quizwiz!

39. In a domain, the process of allowing a user to sign on to the network from any computer on, the network and get access to resources is managed by what service?

Active Directory Domain Services (AD DS)

Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 22 b. UDP 161 C. TCP 3389 d. UDP 10000

C. TCP 3389

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. traceroute b. ifconfig C. ping d. route

C. ping

Choose the hexadecimal representation of the binary number 11000011.

C3

What network model draws a clear distinction between devices that share their resources and devices that do not?

Client/server

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Two different IPv4 address spaces will exist on the same network segment. b. Both IPv4 and IPv6 protocols will be used on the network. c. The router serving the network will have a redundant spare. d. The network will exist on two separate segments, separated by a proxy.

b. Both IPv4 and IPv6 protocols will be used on the network.

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EU1-64 b. IEEE 802.36 c. UUID-128 d. MACin6

b. IEEE 802.36

What does the MX record do in a forward DNS zone?

It identifies the e-mail server to be used for e-mail traffic for the domain.

36. Which of the following is not one of the disadvantages of peer-to-peer networks?

They centralize user account logins

How do routers create a broadcast domain boundary?

They do not forward broadcast traffic.

You want to remotely log into an office computer using remote desktop in a secure manner. Which of the following should you use? VPN Tagged packets VLANs Telnet SSH

To connect to remote office securely, you need to use a Virtual Private Network (VPN).

Which of the following physical topologies has the least likelihood of having a collision? Bus Start Ring Mesh

Only a Mesh physical topology has point‐to‐point connections to every device, so it has the least likelihood of ever having a collision.

16. What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?

SNMP

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ipconfig /all b. ifconfig -a c. ip show d. if status

b. ifconfig -a

You need a topology that is scalable to use in your network. Which of the following will you install? Bus Ring Star Mesh

To install a physical topology that provides ease of scalability use a star network. This is a hub or switch device, and this is the most common LAN networks today.

19. The TCP and UDP protocols both exist at what layer of the OSI model?

Transport

1. True/False - The term firmware refers to programs embedded into hardware devices. This software only, changes when a firmware upgrade is performed.

True

10. True/False - After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.

True

6. True/False - In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.

True

9. True/False - The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

True

What is by far the most popular DNS server software available? a.Microsoft DNS b. Dnsmasq c. Oracle Resolver d. BIND

d. BIND

Which of the following is an example of when a point‐to‐multipoint network is called for? When a centralized office needs to communicate with many branch offices When a full mesh of WAN links is in place When multiple offices are daisy‐chained to one another in a line When there are only two nodes in the network to be connected

When a central office, such as a headquarters, needs to communicate directly with its branch offices, but the branches do not require direct communication with one another, the point‐to‐multipoint model is applicable. The other scenarios tend to indicate the use of a point‐to‐point link between sites.

Which of the following is a concern when using peer‐to‐peer networks? Where to place the server Whose computer is least busy and can act as the server The security associated with such a network Having enough peers to support creating such a network

Security is easy to relax in a peer‐to‐peer environment. Because of the trouble it takes to standardize authentication, a piecemeal approach involving users' personal preferences develops. There are no dedicated servers in a peer‐to‐peer network, and such a network can be created with as few as two computers.

What is the term for a device that shares its resources with other network devices?

Server

28. What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

Session Layer

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 67 b. port 68 c. port 546 d. port 547

d. port 547

27. An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

fail-close

37. A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

fail-open

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

false

The 1024 - 65535 range of ports is also known as the "well-known" range.

false

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission.

false

The subnet mask 255.255.255.0 is the only subnet mask that can be used for a Class C network.

false

32. In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire?

fire suppression agent

12. The Data Link Layer utilizes what name for its protocol data unit (PDU)?

frame

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

ifconfig -a

What command can you utilize to display TCP/IP configuration information for each network adapter installed?

ipconfig /all

A characteristics of the OUI of a MAC address is that:

it can be used to identify the manufacturer.

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

link local address

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

mycompany.com

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

ping

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

port numbers

24. If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?

star topology

A hexadecimal number is a number written in the base 16 number system.

true

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

true

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.

true

UDP port 123 is utilized by the Network Time Protocol service.

true

When using IPv6, two or more nodes on the same link are said to be neighbors.

true

23. When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, & can cause intermittent errors?

upset failure

What command can be used to check a domain computer's time source from a Command Prompt window? a. date /source b.w32tm/query /source c. ntpd show source d. time --source

b.w32tm/query /source

If you borrow 3 bits in a class C network, how many usable hosts will be on each subnet?

30

What is by far the most popular DNS server software available?

BIND

What does VLAN stand for?

Virtual local area network (LAN)

35. What is the minimal amount of voltage required to damage an electrical component?

10 volts

Which of the following is NOT a range of IP addresses recommended for use in private networks?

127.0.0.0 through 127.255.255.255

Which of the following IP addresses would be a loopback IP address?

127.0.0.1

In the classful addressing scheme, what range of network addresses is considered a Class B?

128.0.x.y to 191.255.x.y

What is the increment if your subnet mask is 255.255.255.240?

16

Which of the following IP addresses is a Class B address? Mark all that apply.

190.168.60.83 or 128.60.5.52

Which of the following IPv6 addresses represents a global unicast address?

2000::/3

A hexadecimal number represents how many binary digits?

4

How many subnets can you create if you borrow 3 bits in a class C network?

8

The hexadecimal number 5E is what number in decimal?

94

You need a network that provides centralized authentication for your users. Which of the following logical topologies should you use? VLANs Peer‐to‐peer Client/Server Mesh

A client/server logical topology allows you to have a centralized database of users so that authentication is provided in one place.

Which network topology is a combination of two or more types of physical or two or more types of logical topologies? Point‐to‐multipoint Hybrid Bus Star

A hybrid topology is a combination of two or more types of physical or logical network topologies working together within the same network.

Will a computer that shares no resources most likely be connected to the backbone or to a segment?

A segment

A hexadecimal number is a number written in the base 16 number system. A. True b. False

A. True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. A. True b. False

A. True

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. A. True b. False

A. True

UDP port 123 is utilized by the Network Time Protocol service A. True b. False

A. True

When using IPv6, two or more nodes on the same link are said to be neighbors. A. True b. False

A. True

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

AAAA record

What advantage does the client‐server architecture have over peer‐to‐peer? Easier maintenance Greater organization Tighter security All of the above

All of the above In client‐server networks, requests for resources go to a main server that responds by handling security and directing the client to the resource it wants, instead of the request going directly to the machine with the desired resource (as in peer‐to‐peer).

What is a difference between a LAN and a WAN? WANs need a special type of router port. WANs cover larger geographical areas. WANs can utilize either private or public data transport. All of the above.

All of the above. A typical WAN connects two or more remote LANs together using someone else's network (your ISP's) using a router. Your local host and router see these networks as remote networks and not as local networks or local resources.

When designing a network and deciding which type of network topology to use, which item(s) should be considered? (Select all that apply.) Cost Ease of installation Ease of maintenance Fault‐tolerance requirements

All. Each topology has its own set of pros and cons regarding implementation, so asking the right questions and considering cost, ease of installation, maintenance, and fault tolerance are all important factors to be considered.

26. What is the most popular web server application?

Apache

15. In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?

Application

What type of topology gives you a direct connection between two routers so that there is one communication path? Point‐to‐point Star Bus Straight

As its name implies, in a point‐to‐point topology you have a direct connection between two routers, giving you one communication path. The routers in a point‐to‐point topology can either be linked by a serial cable, making it a physical network, or be far away and only connected by a circuit within a frame‐relay network, making it a logical network.

What statement regarding the Server Message Block protocol is accurate? a. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a signaling protocol used to make a connection between hosts prior to data transfer. d. It is a protocol used for accessing network-based LDAP directories.

B. It is used by Windows and UNIX-based operating systems to share files.

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

Which LAN topology is characterized by all devices being daisy‐chained together with the devices at each end being connected to only one other device?

Bus

What are the three primary LAN topologies?

Bus, ring, and star

22. What is a defining characteristic of a bus topology based network?

Devices are daisy-chained together in-a single line.

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used?

EUI-64

2. True/False - The Data Link layer attaches a trailer to the end of a packet, and does not include a header.

False

3. True/False - Static electricity is an electrical charge in motion.

False

4. True/False - The protocol data unit for the Physical layer of the OSI model is payload, or data.

False

5. True/False - The Transmission Control Protocol (TCP) is considered to be a connectionless or best-effort delivery protocol.

False

7. True/False - The Transport layer header addresses a. receiving application by a number called a MAC address.

False

8. True/False - Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.

False

What device is an example of an Ethernet technology implemented as a star topology?

Hub

21. What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?

IP address

You have a network with multiple devices and need to have a smaller broadcast domain while working with a tight budget. Which of the following is the best solution? Use static IP addresses Add more hubs Implement more switches Create VLANs

If you have a switch, you can break up a layer‐2 switched networks into smaller broadcast domains by creating VLAN's.

In what type of network are all computers considered equals and do they not share any central authority? Peer‐to‐peer Client‐server Physical topology None of the above

In a peer‐to‐peer network, all computers are considered equals. It is up to the computer that has the resource being requested to perform a security check for access rights to its resources.

In a physical‐star topology, what happens when a workstation loses its physical connection to another device? The ring is broken, so no devices can communicate. Only that workstation loses its ability to communicate. That workstation and the device it's connected to lose communication with the rest of the network. No devices can communicate because there are now two unterminated network segments.

In a star topology, each workstation connects to a hub, switch, or similar central device, but not to other workstations. The benefit is when connectivity to the central device is lost, the rest of the network lives on.

Which type of topology has the greatest number of physical connections? Point‐to‐multipoint Star Point‐to‐point Mesh

In the mesh topology, there is a path from every machine to every other one in the network. A mesh topology is used mainly because of the robust fault tolerance it offers—if one connection goes on the blink, computers and other network devices can simply switch to one of the many redundant connections that are up and running.

What statement regarding the Server Message Block protocol is accurate?

It is used by Windows and UNIX-based operating systems to share files.

Which of the following is an example of a LAN? Ten buildings interconnected by Ethernet connections over fiber‐optic cabling Ten routers interconnected by frame‐relay circuits Two routers interconnected with a T1 circuit A computer connected to another computer so they can share resources

LANs generally have a geographic scope of a single building or smaller. They can range from simple (two hosts) to complex (with thousands of hosts).

33. At what layer of the OSI model does a network switch normally operate?

Layer 2

14. HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

Layer 7

11. The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?

MAC (Media Access Control) address

25. The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

Material Safety Data Sheet (MSDS)

What common WAN topology often results in multiple connections to a single site, leading to a high degree of fault tolerance?

Mesh

31. At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

Network

18. What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

In the DNS hierarchy, where is information about how to find the top-level domain servers held?

On the DNS root servers.

29. In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

Physical

Which network topology or connection type can be implemented with only two endpoints?

Point‐to‐point

20. The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

Remote Desktop Protocol (RDP)

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

SIP

40. What mail protocol is used to send mail messages to a server?

SMTP

34. In considering the responsibilities of each layer of the e OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

13. In the United States, who is able to activate the Emergency Alert System at the national level?

The President

17. Which of the following is an example of encapsulation?

The addition of a header to data inherited from the layer above in the OSI model.

An example of a hybrid network is which of the following? Ethernet Ring topology Bus topology Star topology

The best answer to this question is Ethernet, which uses a start physical topology with a logical bus technology

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address.

How can you determine the manufacturer of a NIC card based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

What part of a MAC address serves as the extension identifier, or device ID?

The last 24 bits of the MAC address.

38. What statement accurately reflects what occurs when a message is too large to transport oil a network?

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

30. What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?

The packet will be divided into smaller packets using fragmentation.

What is a logical grouping of network users and resources connected to administratively defined ports on a switch? Host Hub VLAN VTP

VLANs allow you to be anywhere on the physical network and still be local to the network resources you need.

What does VPN stand for?

Virtual private network

What does the acronym VPN stand for? Virtual processor network Virtual passive network Virtual private network Variable‐length private network

Virtual private networks (VPNs) allow for the creation of private networks across the Internet. A VPN makes your local host part of the remote network by using the WAN link that connects you to the remote LAN.

Which of the following is a disadvantage of the star topology? When a port on the central concentrating device fails, the attached end device loses connectivity to the rest of the network. When the central concentrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network. In a star topology, a more expensive type of host must be used when compared to the host used when implementing a physical bus. It is more difficult to add stations and troubleshoot than with other topologies

When the central concentrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network. However, this topology makes troubleshooting easier; if the entire network fails, you know where to look first. The central device also ensures that the loss of a single port and the addition of a new device to an available port do not disrupt the network for other stations attached to such a device.

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. A. True b. False

b. False

DNS follows a centralized database model, allowing for easier management of DNS records. A. True b. False

b. False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs A. True b. False

b. False

The 1024 - 65535 range of ports is also known as the "well-known" range. A. True b. False

b. False

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. A. True b. False

b. False

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer has been assigned a routed public IP address. b. The network card has been erroneously assigned a loopback address. c. The computer is configured to use DHCP, but was unable to lease an address. d. The network card is set up for multicast communication.

c. The computer is configured to use DHCP, but was unable to lease an address.


Conjuntos de estudio relacionados

Which statement is true about the city of Constantinople

View Set

Unit 5 (chapter 19) History of Graphic Design

View Set

Ch 15- Structure and Function of the Neurologic System

View Set