Network Pro, TestOut, Chapter 1 - Networking Basics

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following tasks is associated with the Session layer?

Connection establishment Connection establishment is controlled through the Session layer protocols.

Which of the following topologies connects each network device to a central hub?

Star Star topologies connect each device on the network to a central hub.

The UDP transport protocol provides which of the following features? ( Select all that apply)

-Connectionless datagram services -Low overhead UDP is a conectionless protocol used by applications that need low overhead and do not require guaranteed delivery.

Which of the following functions are performed by the OSI Transport layer? ( Select three.)

-Data segmentation and reassembly -End-to-end flow contol -Reliable message delivery The Transport layer is responsible for breaking upper-layer data into segments and allowing reliable communication through end-to-end flow control, error detection, and error correction.

In the OSI model, which of the following functions are performed at the Application layer? (Select all that apply.)

-Enabling communication between network clients and services -Integrating network functionality into the host operating system. The Application layer enables network services and integrates network functionality into the host operating system. Applications actually run above the OSI Application layer.

Which of the following are included as part of the Data Link layer specifications? (Select two.)

-Identifying physical network devices -Controlling how messages are propagated through the network The Data Link layer controls device identification on networks, as well as how messages travel through the network.

The Data Link Layer of the OSI model is comprised of two sublayers. What are they? (Select two)

-LLS -MAC The Data Link layer is split into the following sublayers: -The Logical Link Control (LLC) which provides the operating system link to the device driver. -The Media Access Control (MAC) which translates generic network requets into device-specific terms.

Which of the following are functions of the MAC sublayers? (Select two.)

-Letting devices on the network have access to the LAN -Defining a unique hardware address for each device on the network. The MAC sublayer defines a unique MAC or data-link address for each device on the network. This address is usually assigned by the manufacturer. The MAC sublayer also provides devices with access to the network media.

In the OSI model, which of the following functions are performed at the Presentation layer? (Select two.)

-Specify data format (such as file formats) -Encrypt and compress data The Presentation layer encrypts data, changes and converts character sets, and compresses data. File formats (such as .jpg, .wmv, and .wav) are part of the Presentation layer.

What topologies is a CAN able to use?(Select three.)

-Star -Ring -Bus A controller area network (CAN) is designed to allow communications between mircrocontrollers and devices. CANs use Bus, Star, and Ring topologies.

What is the binary format for the following decimal IP address? 131.9.202.111

10000011.00001001.11001010.01101111 ^9

Match each decimal value on the left with the corresponding hexadecimal value on the right. Not all decimal values have a corresponding hexadecimal value.

11 = 17 B = 11 D = 13 F = 15 C = 12 10 = 16

What is the decimal format for the following binary IP address? 11001110.00111010.10101010.01000011

206.58.170.67

Match the networking function or device on the left with the OSI model layer it is associated with on the right.

Application = HTTP Presentation = ASCII Session = Session ID number Transport = Port numbers Network = Router Data Link = Switch Physical = Modem

Which of the following topologies connects all devices to a trunk cable?

Bus The bus topology connects all devices to a trunk cable.

You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have?

Client-Server In a client-server network, hosts have a specific role. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources. In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts, and host is in charge of controlling access to those resources.

What is the basic purpose of the OSI Physical layer?

Coordinate rules for transmitting bits. The OSI Physical layer coordinates rules for transmitting bits.

Which protocol is used on the World Wide Web to transmit web pages to web browsers?

HTTP Web servers and browsers use or hypertext transfer protocol (HTTP), to transmit web pages on the internet. Often confused with hypertext makeup language (HTML), which is used to create web content.

Which protocol is used to securely browse a website?

HTTPS HTTPS is a secure form of HTTP that uses SSL to encrypt data before it is transmitted.

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?

ICMP The Internet Control Message Protocol (ICMP) allows hosts to exchange messages to indicate a packet,s status as it travels through the network.

Which of the following protocols stores email on the mail server and allows users to access messages from various client devices without having to download the email?

IMAP4

You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol was designed for this purpose?

IMAP4 The internet message access protocol version 4 (IMAP) is an email retrieval protocol designed to enable users to access their email from various locations without transferring messages or files back and forth between computers. Messages remain on the remote mail server and not automatically downloaded to a client system.

You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?

Mesh A mesh topology has multiple connections at each node(host), increasing connectivity fault tolerance. None of the other topologies have native fault tolerance built in.

You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?

Mesh This type of network uses a physical mesh topology. A mesh topology has two key characteristics: -There is no central connecting point. -Any host can communicate directly with any other host on the network.

Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

Mesh In a mesh topology, each network device is interconnected to all other network nodes. This creates multiple date paths. If a link fails, the data has an alternate route to its destination.

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network. Messages sent using a physical bus topology are broadcast to all devices in the network. The device in the middle of the star, which is typically a hub, receives the message and forwards it on all other devices.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device. In a logical ring topology, messages travel to each device in turn. If the message is not intended for that device, the message is forwarded to the next device on the network.

Which of the following geographic network types are typically managed by a city as a public utility?

Metropolitan area network (MAN) A metropolitan area network (MAN) is a network that can cover an entire city. A city typically owns and manages a MAN as a public utility.

Which of the following functions are preformed at the Physical layer of the OSI model?

Moving data across network cables? The Physical layer is concerned with how to transmit data and how to connect network hosts.

You have a large TCP/IP network and want to keep hosts' real time clock synchronized. What protocol should you use?

NTP The network time protocol (NTP) lets you keep clock synchronized.

Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server?

POP3 The POP3 protocol is part of the TCP/IP protocol suite. It is used to retreive email from a remote server to a local client over a TCP/IP connection. SNMP is a protocol used to monitor network traffic. SMTP is a TCP/IP protocol used to send email. FTP is used to transfer files.

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement?

Partial Mesh In a partial mesh topology, only some redundant paths exist. A partial mesh topology is more practical and less expensive than a full mesh topology. In a full mesh topology, every device has a point-to-point connection with every other device. This provides full redundancy, but it is expensive and impractical.

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have?

Peer-to-Peer In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts, and each host is in charge of controlling access to those resources. In a client/server network, host have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources.

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more then one.

Presentation = Application Data Link = Network Access Application = Application Session = Application Network = Internet Transport = Host-to-Host

Which of the following topologies connects each device to a neighboring device?

Ring In ring tolologies, each device connects to a neighboring device so that a ring is formed.

In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device?

Ring In ring topologies, each device on the network acts as a repeater for sending the signal to the next device.

In the OSI model, what is the primary function of the Network layer?

Routes messages between networks The Network layer is responsible for routing messages between networks?

Which protocol sends email to a mail server?

SMTP SMTP sends email to a mail server.

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol will enable message exchange between systems?

SMTP The simple mail transfer protocol (SMTP) specifies how messages are exchanged between email servers. Email clients use POP3 and IMAP4 to download email messages from email servers.

During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. (Not all layers have a matching information format.)

Session Layer = NOT USED Transport Layer = Segments Network Layer = Packets Data Link Layer = Frames Physical Layer = Bits

Your have a small network that uses a switch to connect multiple devices. Which physical topology are you using?

Star

What device is used to create a physical star topology?

Switch A physical star topology uses a switch or a hub. Routers are used to connect multiple subnets together. A firewall is a router that filters packets or other network communications.

You are an application developer, and you are writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability?

TCP

Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?

TCP The TCP protocol includes error checking.

Which OSI model layer is responsible for guaranteeing reliable message delivery?

Transport The Transport layer is responsible for connection services that provide reliable message delivery through error detection and correction mechanisms. Specifically, the TCP protocol provides these services.


Conjuntos de estudio relacionados

Life Insurance Chapter 7 Qualified Plans

View Set

Ch 1 - World of Innovative Management

View Set

Customer Service 4.2 Think Critically and Check Point Questions

View Set

Monetary Policy (Chapter 15 quiz)

View Set