CTS 110 Network Essentials Module 1 to Module 13 Quiz for Network+ Guide to Networks 8th Edition
What is the approximate cost of the network diagram app called Draw.io?
$0
Select the two main protocols that run at Layer 3 of the OSI Model.
- ICMP - IP
ARP works in conjunction with IPv4 to discover the _______________ address of a node on the local network and maps those addresses to _________________ addresses.
- MAC - IP
Select the two main protocols that run at Layer 4 of the OSI Model.
- UDP - TCP
Which of the following are advantages of a Client-Server network model? (Choose 3)
-They are more scalable. -Access to multiple shared resources can be centrally granted to a user or group of users. -User accounts and passwords are assigned in one place.
Which of the following are advantages of peer-to-peer networks (Choose 3)
-They are simple to configure. -They are good for networks that support fewer than 15 computers. -They are often less expensive to set up and maintain.
Select the two main protocols of the Transport layer.
-UDP -TCP
A safety measure that allows access during a failure is called ________ and a safety measure that denies access during a failure is called and a safety measure that denies access during a failure is called ________.
-fail open -fail close
Decimal and Binary values can also be represented by Hex characters. What are the valid Hex characters?
0-9, A-F
Convert Decimal 20 to Binary. Make sure you list all eight bits.
0001 0100
When a DHCP server gives a client an IP address, it sets a time limit, or lease time, on the IP address. In about 30 words, explain: 1 - What happens at the end of the lease time. 2 - What happens if the lease time is too short. 3 - What happens if the lease time is too long. 4 - Include a suggested low and high lease time. 5 - What type of office can benefit from a longer lease time. 6 - What type of office can benefit from a shorter lease time.
1 - At the end of lease time, the IP address expires and is now available to a new client. 2 - If the lease time is too long the network will suffer exhausted DHCP scope and no new clients can join. 3 - If the lease is too short, network availability will be disruptive. 4 - Lease times range from 2 hours to 8 days. 5 - Longer lease times are better for smaller offices without a lot of growth. 6 - Short lease times are better for larger networks where clients log on and off frequently.
ARP tables might contain two different types of entries. 1 - What are they, and 2 - How are they created?
1 - Dynamic and static are the two entries for ARP tables 2 - Static are entries that do not change as someone entered them in manually. Dynamic entries are created by a client requesting an ARP.
Which of the following IP addresses would be a loopback IP address?
127.0.0.1
An MTU is the maximum transmission unit, or the largest size of a frame, in bytes, that routers in the path will allow. What is the layer 2 default MTU?
1500 bytes
The APIPA addresses are from ___________ to ______________.
169.254.0.1 to 169.254.255.254
Which IPv4 addresses are valid? (Choose 3)
192.168.4.64 74.122.199.254 1.22.146.5
Which IPv6 addresses are valid? (Choose 3)
2001:5af:2::56:3d4 2001:98:0045:0000:0001::2 FE0:201:95af::32ab:56:3d4
A MAC address is typically written as hex. Write a valid MAC address in Hex.
30:65:EC:6F:C4:58
An IPv4 address has ________ bits and an IPv6 address has __________bits.
32 bits for IPv4 address 128 bits for IPv6 address
A MAC address is ___ bits.
48
Write the Hex character for binary 1010.
A
In a DNS zone, what type of record holds the name-to-address mapping for IPv4 addresses?
A record
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?
Both IPv4 and IPv6 protocols will be used on the network.
Computers store values as an electrical charge (binary 1) or no electrical charge (binary 0). Each binary value is called a bit. What is a group of eight bits called?
Byte
A good naming convention for computers in classroom 223 in the CALT building on the Arnold Campus would be:
CALT223-01, CALT223-02, CALT223-03
Which organization set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices?
Cisco
List the Private address range for each class of IPv4 addresses:
Class A range: 10.0.0.0 - 10.255.255.255 Class B range: 172.16.0.0 - 172.31.255.255 Class C range: 192.168.0.0 - 192.168.255.255
List the range of the first octet of Class A, Class B, and Class C IPv4 addresses.
Class A: 1-126 Class B: 128-191 Class C: 192-223
Match the Class with the Network and Host portion for IP addresses.
Class A: N.H.H.H Class B: N.N.H.H Class C: N.N.N.H
Match the function to the Layer 4 Protocol.
Connection-oriented: TCP Sequencing: TCP Acknowledgment: TCP Flow control: TCP Three-way-handshake: TCP Guarantees delivery: TCP Connectionless: UDP Good for live audio or video: UDP
Convert Binary 1101 0111 to Hex.
D7
Match the following terms with their definition.
Entry Facility: Location where an incoming network, such as the Internet, connects with the school or corporate network Demark point: Device that marks where a telecommunications service provider's network ends and the organization's network begins MDF: Centralized point of interconnection for an organization's LAN or WAN IDF: Provides an intermediate connection between MDF and end-user equipment on each floor and in each building KVM: Switch that connects to a single console to provide central control portal for all device on the rack
TCP transmissions continue until a specific flag bit is set to 1. Which flag is this?
FIN
An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
False
Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.
False
IPv4 and IPv6 use the same packet format and length.
False
Sensitive electronic components can not be damaged by static electricity.
False
Telnet is a secure protocol used to "remote in" or control a computer remotely.
False
The TCP header includes a Source port and a Destination port. The UDP header does not include either of these.
False
According to the standard for diagram symbols, what is the following device?
Firewall
Match the two main Web service protocols and whether the protocol is Secure or Unsecure
HTTP-Unsecure HTTPS-Secure
You need to check connectivity to Cengage so you open a browser window and type "ping cengage.com" in a Command Prompt. What Layer 3 protocol does ping use?
ICMP
The Network layer adds ___ addresses.
IP
Typically a Switch operates at layer 2 of the OSI model. However, small organizations, such as a SOHO, can purchase a switch that also interprets Layer 3 data and works much like a router. What is this device called?
Layer 3 Switch
Match the OSI layer with the address it adds to the data from the upper layers of the OSI model.
Layer 4: Port address Layer 3: IP address Layer 2: MAC address
Match the OSI Layer and the PDU:
Layer 7, 6, and 5: Payload or Data Layer 4: Segment Layer 3: Packet Layer 2: Frame Layer 1: Bit or transmission
List the seven layers of the OSI model in order - layer 1 at the bottom and Layer 7 at the top.
Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link Layer 1: Physical
Match the router function with a router.
Located inside networks within the same autonomous system: Core router or interior router Connect an autonomous system with an outside network, also called an untrusted network: Edge router or border router Refers to any router outside the organization's AS, such as a router on the Internet backbone: Exterior router
The Data Link layer adds ___ addresses.
MAC
My computer in the CALT building of AACC's main campus has an IP address of 10.0.16.141. I am requesting the Google home page. Because the Source IP address (my computer) is private it will need to be changed to AACC's public IP address at the router. The service that changes the IP address before the packet is sent out to the Internet is called _____.
NAT
To attach to a network a computer requires a NIC. NIC stands for (three words) [ans1].
Network Interface Card
During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?
No more than 1 inch of the cable should be exposed.
What federal agency is charged with safety and health in the workplace?
Occupational Safety and Health Administration (OSHA)
Which of these area networks is the smallest by geographic size:
PAN
Periodically, we will be responsible for software and hardware changes. Match the terms below with their definition
Patch: A correction, improvement, or enhancement to software which corrects bugs or add minor enhancements Upgrade: A major change to a software package that enhances functionality and features of the software Rollback: The process of reverting to a previous version of software
Of the well-known TCP and UDP ports, which two carry DHCP traffic?
Port 67 Port 68
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
Port numbers
Good documentation includes business documents. Match the business documents below with their definition.
RFP: Request to vendors to submit a proposal for a product or service MOU: List the intentions of two or more parties to enter into a binding agreement, or contract SOW: A detailed list of the work that must be completed for a particular subject SLA: A legally binding contract or port of a contract that defines the aspects of a service MSA: A contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements MLA: Grants a license from a creator, such as a software producer, to a third party for the purpose of marketing the products to consumers
According to the standard for diagram symbols, what is the following device?
Router
What mail protocol is used to send mail messages to a server?
SMTP
An Application layer utility program called __________ monitors and gathers information about network traffic and can alert network administrators about adverse conditions.
SNMP
TCP uses a three-way handshake to establish a session before TCP transmits data. Select the transmissions of the three-way handshake.
SYN, SYN/ACK, ACK
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?
Sliding-window
Match the seven troubleshooting steps with the step number.
Step 1: Identify the problem and its symptoms Step 2: Establish a theory of probable cause Step 3: Test your theory to determine the cause Step 4: Establish a plan for resolving the problem Step 5: Implement the solution or escalate the problem Step 6: Verify functionality and implement preventive measures Step 7: Document findings, actions, and outcomes
According to the standard for diagram symbols, what is the following device?
Switch
The connectionless IP protocol relies on what other protocol to guarantee delivery of data?
TCP
Encrypted control of remote computers using the RDP protocol is accomplished using what port number?
TCP 3389
You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?
The MTU for the network can be as high as 9198 bytes.
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?
The computer is configured to use DHCP, but was unable to lease an address.
How can you determine the manufacturer of a NIC based on the MAC address?
The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
VoIP is
The use of any network to carry voice signals using TCP/IP protocols
At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.
True
Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.
True
Fiber-optic cable comes in two types: single-mode fiber (SMF) and multimode fiber (MMF).
True
In a Peer-to-Peer network model, each computer's operating system is responsible for controlling access to its resources.
True
Layer 2 is the only layer of the OSI model that adds a header and a trailer to the payload it inherits from the layer above it.
True
Network Diagrams are graphical representations of a network's devices and connections.
True
Port 123 is utilized by the Network Time Protocol service.
True
RDP is a secure protocol used to "remote in" or control a computer remotely.
True
Routers work at layer 3. They join two or more networks and pass packets from one network to another.
True
SSH is a secure protocol used to "remote in" or control a computer remotely.
True
The TIA/EIA standard for wall jacks in a work area requires that at least one outlet be provided for data and one for voice.
True
The process of designing, implementing, and maintaining an entire network is called the System Life Cycle.
True
When TCP sends data, the sequence numbers will be increased by the number of bits included in each received segment, as confirmation that the correct length of message was received. This new number (sequence number plus number of bits in the segment) will become the acknowledgment number for the return message.
True
When using IPv6, two or more nodes on the same link are said to be neighbors.
True
To rollback or reverse an operating system patch you should
Use the patch's automatic uninstall utility
VoIP stands for [ans].
Voice over Internet Protocol
Which of these area networks is the largest by geographic size?
WAN
According to the standard for diagram symbols, what is the following device?
Workstation
Nmap was originally designed for Linux as a command-line utility but has since been expanded for compatibility on several other OSes. What is the name of the GUI front end that is available for the Nmap utility?
Zenmap
A/an [ans] is a central conduit that connects the segments of a network. The arrows are pointing to the central conduit.
backbone
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?
ifconfig -a
On a Windows system, what command can you utilize to display TCP/IP configuration information for each network adapter installed?
ipconfig /all
Below is a [top] topology.
mesh
Fill in the command that produced the following output. Be specific. In other words, you must include everything that would be typed in Command Prompt. Pinging google.com [142.250.73.206] with 32 bytes of data: Reply from 142.250.73.206: bytes=32 time=30ms TTL=54 Reply from 142.250.73.206: bytes=32 time=32ms TTL=54 Reply from 142.250.73.206: bytes=32 time=38ms TTL=54 Reply from 142.250.73.206: bytes=32 time=30ms TTL=54 Ping statistics for 142.250.73.206: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 30ms, Maximum = 38ms, Average = 32ms
ping google.com
Below is a [top] topology.
ring
A/an _______ manages traffic between two or more networks and helps find the best path for traffic.
router
Below is a [top] topology.
star
What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?
wiki
What type of diagram is a graphical representation of a network's wired infrastructure?
wiring schematic