Networking - Chapter 2: Networking Basics
Match each TCP/IP layers with its function. Drag: A. Transport B. Application C. Link D. Internet Drop: 1. Breaks the data into pieces. 2. Prepares the data to be sent. 3. Adds physical addesses. 4. Adds logical addresses.
A-1 B-2 C-3 D-4
Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more than once. Drag: A. Application B. Network C. Internetwork D. Transport Drop: 1. Presentation layer 2. Data Link layer 3. Application layer 4. Session layer 5. Network layer 6. Transport layer
A-1 B-2 A-3 A-4 C-5 D-6
During TCP/IP communication between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. Drag: A. Segments B. Packets C. Frames D. Bits Drop: 1. Transport layer 2. Network layer 3. Data Link layer 4. Physical layer
A-1 B-2 C-3 D-4
Workstation2 needs to send data to Workstation3. Identify the Layer 2 and Layer 3 addresses Workstation2 will use to send the data by dragging the corresponding address from the list on the left to its location on the right. Drag: A. 080046987654 B. 192.168.10.12 C. 000b5f2a2222 D. 192.168.11.11 Drop: 1. Layer 2 source address 2. Layer 3 source address 3. Layer 2 destination address 4. Layer 3 destination address
A-1 B-2 C-3 D-4
Workstation3 has started communicating with Workstation2. It sends a frame to the default gateway. Identify the Layer 2 and Layer 3 addresses used by the Cisco 2600 router to forward the data to Workstation2 by dragging the corresponding address from the list on the left to its location on the right. Drag: A. 000b5f2a2222 B. 192.168.11.11 C. 080046987654 D. 192.168.10.12 Drop: 1. Layer 2 source address 2. Layer 3 source address 3. Layer 2 destination address 4. Layer 3 destination address
A-1 B-2 C-3 D-4
Match each networking function or device on the left with its associated OSI model layer on the right. Drag: A. HTTP B. Encapsulation C. Session ID number D. Port number E. Router F. Switch G. Modem Drop: 1. Application layer 2. Presentation layer 3. Session layer 4. Transport layer 5. Network layer 6. Data Link layer 7. Physical layer
A-1 B-2 C-3 D-4 E-5 F-6 G-7
You're configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select two.) A. 110 B. 143 C. 443 D. 25 E. 21
A. 110 D. 25
You've recently installed a new Windows server. To ensure system time accuracy, you've loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now you must configure your network firewall to allow time synchronization traffic through. Which of the following ports are you MOST LIKELY to open on the firewall? A. 123 B. 119 C. 110 D. 80
A. 123
Which of the following topologies connects all devices to a trunk cable? A. Bus B. Ring C. Star D. Mesh
A. Bus
Which of the following tasks is associated with the Session layer? A. Connection establishment B. Data block breakdown C. IP address assignment D. Port number assignment
A. Connection establishment
In the OSI model, which of the following functions are performed at the Application layer? (Select two.) A. Enabling of communication between network clients and services. B. Communication setup, maintenance, and teardown. C. Device control for data transmission rates. D. Integration of network functionality into the host operating system. E. Standard setting for sending and receiving signals.
A. Enabling of communication between network clients and services. D. Integration of network functionality into the host operating system.
Which of the following functions are performed by the OSI Transport layer? (Select three.) A. End-to-end flow control B. Path identification and selection C. Reliable message delivery D. Media access control, logical topology, and device identification E. Data segmentation and reassembly F. Packet formatting for delivery through the medium G. Consistent data formatting between dissimilar systems
A. End-to-end flow control C. Reliable message delivery E. Data segmentation and reassembly
Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? A. Mesh B. Star C. Bus D. Ring
A. Mesh
Which of the following geographic network types is typically managed by a city as a public utility? A. Metropolitan area network (MAN) B. Personal area network (PAN) C. Local area network (LAN) D. Wide area network (WAN)
A. Metropolitan area network (MAN)
Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol enables message exchange between systems? A. SMTP B. IMAP4 C. POP3 D. ICMP
A. SMTP
Which port does Telnet use? A. 53 B. 23 C. 80 D. 25
B. 23
In the OSI model, which of the following functions are performed at the Presentation layer? (Select two.) A. End-to-end flow control B. Data encryption and compression C. Data frame transmission D. Data format specifications E. Network services
B. Data encryption and compression D. Data format specifications
Which of the following are included as part of the Data Link layer specifications? (Select two.) A. Digital data conversion B. Data transmission between hosts C. Physical topology D. Cable and connector specifications E. Physical network device identification
B. Data transmission between hosts E. Physical network device identification
Which of the following is the process of breaking a message into packets, adding controls and other information, and then transmitting the message through the transmission medium? A. Sequencing B. Encapsulation C. Segmentation D. Transformation
B. Encapsulation
What role does ARP play in the routing process? A. If a router does not know a destination device's IP address, it sends an ARP broadcast containing the destination device's MAC address and requesting its IP address. B. If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the destination device's IP address and requesting its MAC address. C. ARP does not play any role in the routing process. Switches use ARP to map IP addresses to MAC addresses in collision domains. D. If a router knows a destination host's MAC and IP address, it sends an ARP request to update the other routers' routing tables.
B. If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the destination device's IP address and requesting its MAC address.
Which of the following features does UDP provide? (Select two.) A. Lost packet retransmission B. Low overhead C. Packet acknowledgement D. Data packet sequencing E. Connectionless datagram services
B. Low overhead E. Connectionless datagram services
You have a large TCP/IP network and want to keep a host's real-time clock synchronized. Which protocol should you use? A. SNMP B. NTP C. SMTP D. FTP
B. NTP
You've implemented a network where each device provides all other devices on the network with access to shared files. Which type of network do you have? A. Multiple access B. Peer-to-peer C. Client-server D. Polling
B. Peer-to-peer
You're an application developer, and you're writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability? A. UDP B. TCP C. FTP D. SIP
B. TCP
What is the basic purpose of the OSI Physical layer? A. Define when devices have access to the LAN. B. Define how physical network devices are identified on a network. C. Coordinate rules for sending and receiving electrical signals. D. Maintain a list of known networks and neighboring routers.
C. Coordinate rules for sending and receiving electrical signals.
You have a network that uses a logical bus topology. How do messages travel through the network? A. Messages travel from one device to the next until they reach the destination device. B. Messages are sent directly to the correct destination device. C. Messages are broadcast to all devices connected to the network. D. Messages are sent to a central device that forwards them to the destination devices.
C. Messages are broadcast to all devices connected to the network.
Which term does the OSI model use that's different from the TCP/IP model in reference to the terms frame, packet, and segment? A. HTTP B. Presentation C. Protocol data unit (PDU) D. Session
C. Protocol data unit (PDU)
Which of the following topologies connects each device to a neighboring device? A. Star B. Mesh C. Ring D. Bus
C. Ring
Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true? A. Diskless workstations use ARP to ask a server for an IP address. B. ICMP lets routers bypass the general network broadcast by providing a dynamic table of IP-to-MAC address mappings. C. Routers use ARP to resolve known IP addresses into MAC addresses. D. Routers use DNS to resolve MAC addresses of diskless workstations into IP addresses based on the information contained in other routers' routing tables.
C. Routers use ARP to resolve known IP addresses into MAC addresses.
TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back? A. RST B. ACK C. SYN/ACK D. SYN/RST
C. SYN/ACK
Which of the following network services or protocols uses TCP/IP port 69? A. POP3 B. SMTP C. TFTP D. NNTP
C. TFTP
Which port number is used by SNMP? A. 25 B. 110 C. 119 D. 161
D. 161
During network transmission, data is transferred to various routers, which forward the data to the appropriate network. If the source and destination network addresses reside on the same network, which protocol is used to determine the destination IP's MAC address? A. UDP B. TCP C. HTTP GET D. ARP
D. ARP
What is the purpose of a frame check sequence (FCS) footer? A. Control information B. Hold segment data C. Contain logical network addresses D. Checksum error detection
D. Checksum error detection
You've implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but they don't host services of their own. Which type of network do you have? A. Peer-to-peer B. Intranet C. Extranet D. Client-server
D. Client-server
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? A. DHCP B. IGMP C. TFTP D. ICMP
D. ICMP
You have a network that uses a logical ring topology. How do messages travel through the network? A. Messages are sent to all devices connected to the network. B. Messages are sent directly to the destination device only. C. Messages are sent to a central device that forwards them to the destination devices. D. Messages travel from one device to the next until they reach the destination device.
D. Messages travel from one device to the next until they reach the destination device.
Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? A. Star B. Full mesh C. Bus D. Partial mesh
D. Partial mesh
In the OSI model, what is the primary function of the Network layer? A. Ensure that packets are delivered with no loss or duplication. B. Enable communication between network clients and services. C. Transmit data frames. D. Route messages between networks.
D. Route messages between networks.
You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? A. Mesh B. Ring C. Bus D. Star
D. Star