Network+ Guide to Networks Chapt 1-4 Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Active Directory Domain Services (AD DS)

When creating network diagrams, what icon description typically represents a network router?

An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

When creating network diagrams, what icon description typically represents a network switch?

An icon that is rectangular, which contains four arrows pointing in opposite directions.

The TCP and UDP protocols both exist at what layer of the OSI model?

Transport

A hexadecimal number is a number written in the base 16 number system. True/False

True

A master service agreement (MSA) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements. True/False

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. True/False

True

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public True/False

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data True/False

True

Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF). True/False

True

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets. True/False

True

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS. True/False

True

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. True/False

True

The process of designing, implementing, and maintaining an entire network is called the system life cycle. True/False

True

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?

VoIP gateway

What is the name of the GUI front end that is available for the Nmap utility?

Zenmap

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?

at least 3 feet

In the classful addressing scheme, what range of network addresses is considered a Class B? a) 1.x.y.z to 126.x.y.z b) 128.0.x.y to 191.255.x.y c) 224.x.y.z to 255.x.y.z b) 192.0.0.x to 223.255.255.x

b) 128.0.x.y to 191.255.x.y

What statement correctly identifies the purpose of a software patch? a) A software patch is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities. b) A software patch is a correction, improvement, or enhancement to software. c) A software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources. d) A software patch involves the process of reverting to a previous version of software after attempting to upgrade it.

b) A software patch is a correction, improvement, or enhancement to software.

Which of the following is an example of encapsulation? a) The modification of headers from a higher layer in the OSI model. b) The addition of a header to data inherited from the layer above in the OSI model. c) The subtraction of a header from data inherited from the layer below in the OSI model. d) The addition of a trailer to data inherited from the layer above in the OSI model.

b) The addition of a header to data inherited from the layer above in the OSI model.

Which of the following is NOT a range of IP addresses recommended for use in private networks? a) 172.16.0.0 through 172.31.255.255 b) 192.168.0.0 through 192.168.255.255 c) 127.0.0.0 through 127.255.255.255 d) 10.0.0.0 through 10.255.255.255

c) 127.0.0.0 through 127.255.255.255

The Data Link Layer utilizes what name for its protocol data unit (PDU)?

frame

What IPv6 field is similar to the TTL field in IPv4 packets?

hop limit

Where is a demarc located in relation to the structured cabling of an enterprise environment?

in the Main Distribution Frame (MDF)

What command can you utilize to display TCP/IP configuration information for each network adapter installed?

ipconfig /all

What routing metric affects a path's potential performance due to delay?

latency

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

mycompany.com

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

ping

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

port numbers

You are connected to your network's Cisco router, and need to verify the route table. What command should you enter?

show ip route

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?

vertical cross connect

What occurs when a collision happens on a network

Each node on the network waits a random amount of time and then resends the transmission

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

Fail-open

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. True/False

False

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas. True/False

False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. True/False

False

IPv4 and IPv6 use the same packet format. True/False

False

TCP uses a four-step process called a four-way handshake to establish a TCP connection. True/False

False

The Data Link layer attaches a trailer to the end of a packet, and does not include a header. True/False

False

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. True/False

False

The Transport layer header addresses a receiving application by a number called a MAC address. True/False

False

The protocol data unit for the Physical layer of the OSI model is payload, or data. True/False

False

UDP provides error checking, but not sequencing. True/False

False

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Framing

What is the purpose of the checksum TCP field?

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change.

At what layer of the OSI model does a network switch normally operate?

Layer 2

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? MAC (Media Access Control) address DAC (Data Access Control) address DAC (Digital Access Control) address PAC (Packet Access Control) address

MAC (Media Access Control) address

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

Network

In general, how much can a twisted-pair's cable be bent before data transmission may be impeded?

No more than four times the diameter of the cable.

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

In the DNS hierarchy, where is information about how to find the top-level domain servers held?

On the DNS root servers.

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

Remote Desktop Protocol (RDP)

What mail protocol is used to send mail messages to a server?

SMTP

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

What is the minimal amount of voltage required to damage an electrical component? 1500 volts 5 volts 10 volts 100 volts

10 volts

When planning horizontal cabling, what is the maximum allowable distance that can be used?

100 meters

Which of the following IP addresses would be a loopback IP address? 169.254.0.1 192.168.1.1 224.0.0.1 127.0.0.1

127.0.0.1

By default, what is the MTU size on a typical Ethernet network?

1500 bytes

In the United States, who is able to activate the Emergency Alert System at the national level?

The President

What does backbone cabling consist of?

The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

How can you determine the manufacturer of a NIC card based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

What part of a MAC address serves as the extension identifier, or device ID?

The last 24 bits of the MAC address.

What happens when a router receives a packet with a TTL of 0?

The router drops the packet and sends an ICMP TTL expired message back to the host.


Ensembles d'études connexes

MEN (multiple endocrine neoplasia) and DM type I

View Set

Chapter 53: Caring for Clients with Disorders of the Female Reproductive System

View Set

analyzing Adjustments and Extending Account Balances on a Work Sheet

View Set

Policing System and Practice review 4

View Set