ucertify quiz ch. 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

how big is a TCP packet header? a. the size is always 20 bytes b. the size depends on the protocol being used c. the size is always 40 bytes d. the size depends on the data being sent

a. 20 bytes

you are examining a list of IP addresses. some are internal, some are external, and some are not valid. which of the following is NOT a valid IP address? a. 295.253.254.01 b. 131.156.5.2 c. 245.200.11.1 d. 127.0.0.1

a. 295.253.254.01

you are assigned with attaching connectors to segments of a cable. what type of connector is used with network cables? a. RJ-45 b. RJ-12 c. RJ-85 d. RJ-11

a. RJ-45

john is trying to simply connect three computers in a small network. he does not need any sort of routing capability and is not concerned about network traffic. what is the simplest device for connecting computers? a. hub b. interface c. NIC d. router

a. hub

sharice is trying to teach a new tech basic networking terms. what should she tell this new tech NIC stands for? a. network interface card b. network interaction connector c. network interface connector d. network interaction card

a. network interface card

you are explaining the history of networking to a group of first-year students. what did Time Berners-Lee invent? a. world wide web b. email c. tcp d. first computer virus

a. world wide web

internet addresses of the form www.chuckeasttom.com are called what? a. user-friendly web addresses b. uniform resource locators c. user-accessible web addresses d. uniform address identifiers

b. uniform resource locators

what type of cable is used in most networks? a. shielded untwisted-pair b. unshielded twisted-pair c. shielded twisted-pair d. unshielded untwisted-pair

b. unshielded twisted-pair

which of the following is a unique hexadecimal number that identifies your network card? a. MAC id b. NIC id c. MAC address d. NIC address

c. MAC address

Gunther is setting up encrypted remote communications so that the server admins can remotely access servers. What protocol is used for remotely logging on to a computer in a secure manner? a. telnet b. http c. ssh d. smtp

c. SSH

you are explaining the history of networking to a group of first-year students. what did Vince Cerf invent? a. world wide web b. email c. TCP d. first computer virus

c. TCP

malek is purchasing cable to use in setting up small office networks. he wants to stock up on commonly used cable. what type of cable do most networks use? a. STP b. phone cable c. UTP d. net cable

c. UTP

which us govt agency created the distributed network that formed the basis for the internet? a. nasa b. department of energy c. advanced research projects agency d. cia

c. advanced research projects agency

which class of addresses is the IP address 193.44.34.12? a. class A b. class B c. class C d. class D

c. class C

which layer of the OSI model is divided into two sublayers? a. presentation b. network c. data link d. session

c. data link

which of the following is a device used to connect two or more networks? a. NIC b. hub c. router d. switch

c. router

sheryl is explaining the OSI model to new techs at her company. she is trying to explain what protocols operate at various layers of the OSI model. at what layer of the OSI model does TCP operate? a. application b. transport c. data link d. network

c. transport

juan has just installed a new T1 line in a medical office. the front desk receptionist has asked what speed they can expect. a T1 line sends data at what speed? a. 100 mbps b. 56.6 kbps c. 155 mbps d. 1.54 mbps

d. 1.54 mbps

what protocol translates web addresses into IP addresses? a. SMTP b. DHCP c. TFTP d. DNS

d. DNS

mohammed needs to open a firewall port so that web traffic can be passed through the firewall. what protocol is used for web pages, and on which port does it work? a. DHCP, port 80 b. DHCP, port 21 c. HTTP, port 21 d. HTTP, port 80

d. HTTP, port 80

john is working with command-line utilities to gather diagnostic information about a computer that cannot connect to the network. which utility provides information about a machine's network configuration? a. ping b. MyConfig c. Tracert d. IPConfig

d. IPConfig

what protocol is used to send an email, and on what port does it work? a. POP3, port 110 b. SMTP, port 110 c. POP3, port 25 d. SMTP, port 25

d. SMTP port 25

what is the name for the point where backbones of the internet connect? a. switches b. connectors c. routers d. network access points

d. network access points

the IP address 127.0.0.1 always refers to your what? a. nearest NAP b. nearest router c. ISP d. self

d. self

which of the following was one of the universities involved in the original distributed network set up by a govt agency? a. princeton b. mit c. harvard d. uc berkeley

d. uc berkeley


Ensembles d'études connexes

U.S. History Since 1865 Chapter 23 Study Guide

View Set

Chapter 7.2: THE POWER OF POSITIVE EMOTIONS

View Set

Chapter 2: Two Kinds of Reasoning

View Set

GOVT 2305 - Chapter 15. Foreign Policy

View Set

CHAPTER 12: Workers Compensation

View Set

Chap. 33: Disorders of Cardiac Conduction and Rhythm

View Set

Chapter 4 - The American Revolution, 1754-1783

View Set

Web Design Final Exam Study Guide

View Set