IST Chapter 1,2,3 Test
True
UDP port 123 is utilized by the Network Time Protocol service.
Physical Layer
The lowest, or first, layer of the OSI model. Protocols in this layer generate and detect signals so as to transmit and receive data over a network medium. These protocols also set the data transmission rate and monitor data error rates, but do not provide error correction.
False
The protocol data unit for the Physical layer of the OSI model is payload, or data.
Application Layer
The seventh layer of the OSI model. This layer's protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.
Presentation Layer
The sixth layer of the OSI model. Protocols in the Presentation layer translate between the application and the network. Here, data are formatted in a schema that the network can understand, with the format varying according to the type of network used. The Presentation layer also manages data encryption and decryption, such as the scrambling of system passwords.
Data Link layer Physical layer
A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
Peer-to-peer
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
Star
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star-bus
A network consists of three switches connected together by a network cable. Three computers are connected to the each of the three switches. Which network topology is being used?
Entrance facility
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?
Look at whether the device is located on the ISP's side of the demarc.
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
False
An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
File Transfer Protocol
An encrypted and secure file transfer protocol is SFTP which is based on
Datalink Layer
Anything that works with a MAC address works at this layer such as network cards and switches.
Physical address MAC address hardware address Data Link layer address
At the Data Link layer, which type of network address is used to identify the receiving node?
Segment
At the transport layer , the PDU is known when the TCP protocol is used
datagram
At the transport layer , the PDU is when the UDP protocol is used
Layer 2
Data Link
True
Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.
21
FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port does an FTP server listen on?
Layer 7
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
128
How many bits does an IPv6 address contain?
6
How tall are standard(full) racks? _____________feet
ipconfig /release
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
Rack ears
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
False
In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack.
No more than four times the diameter of the cable.
In general, how much can a twisted-pair's cable be bent before data transmission may be impeded?
at least 3 feet
In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?
HTTP
In the client-server model, what is the primary protocol used for communication between a browser and web server?
burned
PVC cable coating is toxic when
False
Static electricity is an electrical charge in motion.
All devices on your local network
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
3389
Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default?
False
The 1024 - 65535 range of ports is also known as the "well-known" range.
False
The Data Link layer attaches a trailer to the end of a packet, and does not include a header.
True
The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.
False
The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol.
False
The Transport layer header addresses a receiving application by a number called a MAC address.
Session Layer
The fifth layer in the OSI model. This layer establishes and maintains communication between two nodes on the network. It can be considered the "traffic cop" for network communications.
Transport Layer
The fourth layer of the OSI model. In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. this layer services include flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing.
True
The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.
Network Layer
The third layer in the OSI model. Protocols in this layer translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver.
MDF
There is only one ________) per network, but there can be many
ipconfig /all
What command can you utilize to display TCP/IP configuration information for each network adapter installed?
vertical cross connect
What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?
255
What decimal number corresponds to the binary number 11111111?
The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.
What does backbone cabling consist of?
RG-6 Coaxial
What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling?
Segment Transport layer
What is a message called that is delivered by TCP? At which layer does the protocol work?
42
What is the Industry Standard (full rack )unit of measurement that defines the space available in a rack?
List all components on the network.
What is the first step of inventory management?
169.254.0.1 through 169.254.255.254
What is the range of addresses that might be assigned by APIPA?
TIA/EIA-568
What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?
A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.
What statement accurately describes what a cable bend radius determines?
Wiring schematic
What type of diagram shows a graphical representation of a network's wired infrastructure?
punchdown tool
What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block?
HTTP
When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:80. Which Application layer protocol is in use for this session?
FE80::/10
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?
Remote Desktop
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Root servers
Which computers are the highest authorities in the Domain Name System hierarchy?
VoIP gateway
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
POP3
Which email protocol allows an email client to download email messages to the local computer?
IMAP4
Which email protocol allows an email client to read mail stored on the mail server?
Client-server
Which networking model requires that a computer is available with a Network Operating System installed on it?
Routers Switches KVM switch
Which of the following devices are you likely to find in the MDF?
dig
Which of these commands is available only in Linux?
A password manager
Which of these is considered a secure place to store a list of documented network passwords?
MX record
Which type of DNS record identifies an email server?
Port
Which type of address is used at the Transport layer to identify the receiving application?
nslookup
While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?
dallas.mycompany.com
With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?
One
You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
ifconfig -a
You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
POP3
You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol handles your transmission?
Patch cable
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Zenmap Command Prompt PowerShell
You've decided to run an Nmap scan on your network. What app could you open to perform this task?
Layer 7
application
IDF
connecting internal portions of the network
Active Directory
name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?
Layer 3
network
Layer 1
physical
Layer 6
presentation
plenum
rated cabling in the area above the ceiling tile
Internet Layer
responsible for addressing, packaging, and routing messages on the Internet
Layer 5
session
Layer 4
transport