Google Quizzes Networking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field?

16 bits - 65,535 values

What port does the File Transfer Protocol (FTP) typically listen on?

21

How many simultaneous phone conversations can a T1 line carry?

24- A T1 is a dedicated communication line that can carry both data and voice.

How many IP addresses does a class C network have?

254

A company with a large number of hosts creates three subdomains under a main domain. For easier management of the host records, how many zones should be used?

4. Four (4) zones would include the parent and the three (3) subdomains.

The OSI network model has _____ layers.

7

The more accurate name for a cable modem is a ______.

A CMTS is the proper name for a cable modem.

The final step of the DHCP Discovery process is known as ______.

A DHCPACK is the final step in the DHCP Discovery process.

Which of the following is NOT configured by a Dynamic Host Protocol (DHCP) server?

A MAC address is a hardware address assigned to a device by the manufacturer.

TLD stands for ________

A TLD is the last part of an FQDN. Top Level Domain

VPN stands for _______

A VPN allows a device to establish an encrypted tunnel to another network.

What technology helps users get connected and stay secure?

A VPN is used by clients to connect securely to a private network.

An IT systems engineer creates a new Domain Name System (DNS) zone that contains pointer (PTR) resource records. Which zone type has been created?

A reverse lookup zone is used to map domain names to IP addresses.

A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.

A sequence number is used to keep track of where you are in a series of TCP segments.

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

A service record is used to set parameters, like the protocol and ports used for a service with a domain name.

The instantiation of an endpoint in a potential TCP connection is known as a ______.

A socket connects the networking stack of an operating system to applications.

Which field in a Transmission Control Protocol (TCP) header is chosen from ephemeral ports?

A source port is a high-numbered port chosen from a special section of ports known as ephemeral ports.

A Transmission Control Protocol (TCP) connection is established and two devices ensure that they're speaking the same protocol. What has occured?

A three-way handshake involves segments that have SYN, SYN/ACK, and ACK which happens every time a TCP connection is established.

What does a value of one in an ACK control flag represent?

A value of one in the ACK flag field means that the acknowledgement number field should be examined.

TCP Control Flags

ACK/URG/RST

The Domain Name System (DNS) provides an easy way to remember addresses. Without DNS, how many octets for an Internet Protocol (IP) address would have to be memorized?

An IP address is presented with 4 octets separated by decimals, like 192.168.1.1.

A new Domain Name System (DNS) server is being configured. Which record type is used to declare a new zone?

An SOA record establishes a zone and maintains authority over the zone.

During the name resolution process, which technique is used to avoid congestion when querying a server?

Anycast allows a request to be sent to an appropriate server based on factors, like location. This helps relieve severe congestion.

A technique that's used to route traffic to different destinations, depending on factors like location, congestion, or link health, is known as _____.

Anycast lets you route traffic depending on many factors.

Who is permitted to use non-routable address space?

Anyone

What is the importance of using DNS?

Awesome! The Domain Name System (DNS) use records to resolve numeric addresses to friendly names.

When a client computer sends a request to a Domain Name System (DNS) server, what type of packet is sent?

Awesome! The requesting client initiates a query with a DNS server by sending a Synchronize (SYN) packet as a first step in the three-way handshake.

Similar to Wireless networks, cellular networks use band configuration to avoid what problem?

Cell towers are configured to use bands that don't overlap, just like WiFi uses different channels.

What does CIDR stand for?

Classless Inter-Domain Routing

Connection-oriented protocols protect against dropped data by forming connections and using what type of constant stream?

Connection-oriented protocols protect against dropped data with a constant stream of acknowledgements.

Which of the following is NOT a Wide Area Network (WAN) connection type?

DSL is a broadband technology that is used for Internet connectivity.

The concept of taking traffic that's all aimed at the same node and delivering it to the proper receiving service is known as _________.

Demultiplexing allows traffic intended for many different services to be delivered to the same node.

A typical routing table may contain which of the following? Check all that apply.

Destination network and total hops

Along with an IP address, a subnet mask, and a name server, the other thing required for a computer to operate on a network is a _______.

Every networked device needs a gateway to know where to send network intended for outside of the local network segment.

Network Address Translation (NAT) is typically implemented with which hardware devices? Check all that apply.

Firewalls and ROuters

What connection type is known as "always on"?

Great work! Broadband is known as an "always on" technology. This is because a connection does not have to first be initiated.

Digital Subscriber Line (DSL) is the only Internet connection option available for a small office in the middle of nowhere. Which type will provide speeds above 1.544 megabits per second?

High-Bit

In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?

In an ad-hoc network, all nodes communicate and transmit directly to each other.

A modulator/demodulator is better known as a _____.

Modem stands for modulator/demodulator.

A network has the ability to direct traffic toward all of the receiving services. What provides this ability in the transport layer?

Multiplexing in the transport layer means that nodes on a network have the ability to direct traffic toward many different receiving services.

Which value once represented a very popular modem baud rate that was used with dial-up connections?

Nice job! While not commonly used today, dial-up still exists. 14400 (14.4k) baud was a popular baud (speed) rate.

A traditional wireless network involving access points that all have wired connections is known as a(n) _______.

Nice work! A WLAN is the term for a traditional wireless network.

The transport layer handles multiplexing and demultiplexing through what type of device?

Ports

Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below.

Presentation , Session

Which technique is used with Network Address Translation (NAT) where a source port chosen by a client is the same port used by a router?

Preservation helps a router determine which traffic belongs to which host when using NAT.

Where does the CPU store its computations?

Registers

Which solution eliminates the need for dedicated high-speed WAN connections between sites?

Right on! A point-to-point VPN utilizes the Internet to create a more private high-speed link without the need for dedicated WAN technology.

Which type of Domain Name System (DNS) server performs a full name resolution request?

Right on! A recursive name server performs a full DNS resolution request.

Which of the following allows computers on a network to automatically receive address assignment information?

Right on! DHCP is used to automatically assign IP addresses to devices on a network.

A section of the radio spectrum that's been agreed upon to be used for certain communications is known as a _______.

Right on! Different locales might have different frequency bands defined.

There are 13 _____ name servers.

Root

Select examples of routing protocols. Check all that apply.

Routing Information Protocol - BGP

What characteristics distinguish a Solid State Drive from a Hard Disk Drive? Check all that apply.

SSDs have non-moving parts, are a smaller form factor, and also utilize non-volatile memory.

What ordering of TCP flags makes up the Three-way Handshake?

SYN, SYN/ACK, ACK

In which scenario should you use the User Datagram Protocol (UDP)?

Streaming a video through a connectionless protocol, such as UDP, will require less traffic, which will provide a faster connection.

The most common example of a connection-oriented protocol is _____

TCP

In what order will the Transmission Control Protocol (TCP) generally send all segments?

TCP will generally send all segments in sequential order.

Which mechanisms do we use to transport binary data and memory addresses? Check all that apply.

The EDB is used to transport binary data and the Address Bus is used to transport memory addresses.

A Transmission Control Protocol (TCP) connection is in working order and both sides can send each other data. What is the TCP socket state?

The ESTABLISHED state means that the TCP connection is in working order and both sides are free to send each other data.

A company moves a popular website to a new web host. Which of the following will change as a result?

The IP address will certainly change. However, with DNS in place the name stays the same and users will never know that the website moved.

If a TCP socket is ready and listening for incoming connections, it's in the ______ state.

The LISTEN state means that a port is waiting for something to connect to it.

If the transmitting device would like for the receiving device to push currently buffered data to the application on the receiving end immediately, it would set the ____ flag.

The PSH flag ensures that the receiving end doesn't wait for any further data.

You are sending a very small amount of information that you need the listening program to respond to immediately. Which Transmission Control Protocol (TCP) flag will be used?

The PSH flag will be used to push the information immediately.

One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed segments. Which Transmission Control Protocol (TCP) flag will be used?

The RST flag is short for reset. This flag will start the communication from scratch, if one side cannot recover from a series of missing or malformed segments.

Which Transmission Control Protocol (TCP) flag is used to make sure the receiving end knows how to examine the sequence number field?

The SYN flag is used to make sure the receiving end knows how to examine the sequence number field.

What happens to the TTL field of an IP datagram every time it reaches a router?

The TLL field is decremented by 1

The control flag that isn't really in use by modern networks is the _____ flag.

The URG flag has never seen widespread adoption, but it's still defined in every TCP header.

How many bits are in the checksum field in a Transmission Control Protocol (TCP) header?

The checksum field is a 16-bit field and is used to make sure no data was lost or corrupted during transmission.

A device receives a Transmission Control Protocol (TCP) packet. The device understands where the actual data payload begins. Which portion of the TCP header provides this information?

The data offset field communicates how long the TCP header for a segment is. This causes the receiving network device to understand where the actual data payload begins.

Ports that are generally used to establish outbound connections are known as ______ ports.

The exact ports used are different, depending on the operating system, but they're all known as ephemeral ports.

Application layer data lives in the _____ section of the transport layer protocol.

The payload section of one layer contains the content of the layer above it.

Application layer data lives in the ______ section of the transport layer protocol

The payload section of one layer contains the content of the layer above it.

A Virtual Private Network (VPN) uses a particular layer from the OSI reference model to carry an encrypted payload that actually contains an entire second set of packets. Which layer is used?

The payload section of the transport layer is used to contain an entire second set of packets.

A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP) splits up the data into segments. Which field in the header helps keep track of the many segments?

The sequence number is used to keep track of where in a sequence of TCP segments that the packet is expected to be.

Which field in a Transmission Control Protocol (TCP) header is not typically used in modern networking?

The urgent pointer field is not typically used in modern networking. This field points out particular segments that might be more important than others, but is a feature of TCP that hasn't really ever been adopted.

How many Transmission Control Protocol (TCP) control flags are there?

There are 6 TCP control flags.

HTTP is an example of a(n) ______ layer protocol.

There are lots of application layer protocols, but HTTP is one of the most common ones.

A connection, at which layer, implies that every segment of data sent is acknowledged?

Transport

the most common example of a connectionless protocol is _________

UDP

An example of something that operates at the application layer is:

Web browsers and server operate at the application layer.

What's the standard number for a TTL field?

While this value can be set to anything from 0 to 255, 64 is the recommended standard.

What benefits does the Domain Name System (DNS) provide? Check all that apply.

With DNS in place, there is no need to memorize hard to remember IP addresses.DNS easily maps to a system's IP address, even if that address changes.

Cellular network towers are configured in such a way so that they avoid what type of problem?

Woohoo! Cell towers are similar to wireless access points. Configuration of a tower includes avoiding overlap issues.

During the name resolution process, which server does a local recursive server contact first?

You got it! A root name server is queried first in DNS resolution and seeks out TLD servers for information.

WPA stands for _______.

You got it! WPA is an update to WEP that's much more secure.

49152-65535 are called

dynamic and/or private ports

A device involved in a Transmission Control Protocol (TCP) connection is ready to close the connection. The other device in the connection agrees. What has occured?

four-way handshake; A four-way handshake occurs when the session is closed.

The transport layer handles multiplexing and demultiplexing through what type of device?

switches

Ports 1-1023 are known as ______ ports.

system

1024-49151 are called

user or registered ports


Ensembles d'études connexes

Healthy Wealthy and Wise Chapter 5/5a Quiz

View Set

cells unit 2: cell division and genetics

View Set

Vocab Unit 2 choosing the right word

View Set