CH 1 Test Prep

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the minimal amount of voltage required to damage an electrical component? A. 5 volts B. 10 volts C. 100 volts D. 1500 volts

B. 10 volts

Which of the following is not one of the disadvantages of peer-to-peer networks? A. They lack scalability. B. They are not necessarily secure. C. They are impractical for connecting large numbers of computers. D. They centralize user account logins.

D. They centralize user account logins.

The Data Link Layer utilizes what name for its protocol data unit (PDU)? A. packet B. data C. bit D. frame

D. frame

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? A. fail-open B. fail-close C. fail-tolerant D. fail-oriented

A. fail-open

Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients. A. True B. False

B. False

Static electricity is an electrical charge in motion. A. True B. False

B. False

The Data Link layer attaches a trailer to the end of a packet, and does not include a header. A. True B. False

B. False

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. A. True B. False

B. False

The Transport layer header addresses a receiving application by a number called a MAC address. A. True B. False

B. False

The protocol data unit for the Physical layer of the OSI model is payload, or data. A. True B. False

B. False

In considering the responsibilities of each layer of the OSI model, what statements accurately reflects those of the Presentation layer? A. The Presentation layer describes the interference between two applications, each on separate computers. B. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. C. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application. D. The Presentation layer is responsible for transporting Application layer payloads from one application to another.

B. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

What layer of the OSI model describes how data between applications is synced and recovered is messages don't arrive intact at the receiving application? A. Application Layer B. Presentation Layer C. Session Layer D. Transport Layer

C. Session Layer

The TCP and UDP protocols both exist at what layer of the OSI model? A. Application B. Presentation C. Transport D. Network

C. Transport

At what layer of the OSI model does a network switch normally operate? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5

A. Layer 2

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? A. MAC (Media Access Control) address B. DAC (Data Access Control) address C. DAC (Digital Access Control) address D. PAC (Packet Access Control) address

A. MAC (Media Access Control) address

What federal agency is charged with safety and health in the workplace? A. Occupational Safety and Health Administration (OSHA) B. Workplace Safety and Hazard Administration (WSHA) C. Office Safety and Standards Department (OSSD) D. Hazardous Materials and Safety Management (HMSM)

A. Occupational Safety and Health Administration (OSHA)

What is the most popular web server application? A. Microsoft Internet Information Services B. NGINX C. Lighttpd D. Apache

D. Apache

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? A. Layer 4 B. Layer 5 C. Layer 6 D. Layer 7

D. Layer 7

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? A. Application B. Session C. Transport D. Network

D. Network

Which of the following is an example of encapsulation? A. The addition of a header to data inherited from the layer above in the OSI model. B. The subtraction of a header from data inherited from the layer below in the OSI model. C. The modification of headers from a higher layer in the OSI model. D. The addition of a trailer to data inherited from the layer above in the OSI model.

A. The addition of a header to data inherited from the layer above in the OSI model.

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established. A. True B. False

A. True

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS. A. True B. False

A. True

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. A. True B. False

A. True

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed. A. True B. False

A. True

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? A. fail-open B. fail-close C. fail-tolerant D. fail-dynamic

B. fail-close

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? A. bus topology B. star topology C. star bus topology D. mesh topology

B. star topology

What is a defining characteristic of a bus topology based network? A. Devices are connected to two adjacent devices, and communication priority is granted by a token. B. Devices are connected directly to a centralized networking device, known as a network switch. C. Devices are daisy-chained together in a single line. D. Devices are directly attached to a network router, which forwards data to intended destinations.

C. Devices are daisy-chained together in a single line.

In the TCP/IP model, what layer is considered so simple that it is ignored entirely? A. Application B. Network C. Physical D. Data Link

C. Physical

What mail protocol is used to send mail messages to a server? A. POP3 B. IMAP4 C. SMTP D. HTTPS

C. SMTP

What statement accurately reflects what occurs when a message is too large to transport on a network? A. The message is discarded and must be sent again. B. The message is sent anyway, and is received by the destination as garbage data. C. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). D. An ICMP error is generated, and the application must reformat the data for transmission.

C. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? A. Toxic Chemical Safety Procedure (TCSP) B. Dangerous and Hazardous Waste Disposal Sheet (DHWDS) C. Environmental Chemical Hazard Sheet (ECHS) D. Material Safety Data Sheet (MSDS)

D. Material Safety Data Sheet (MSDS)


संबंधित स्टडी सेट्स

Sports and Entertainment Marketing

View Set

Section 4: Understanding Bsic Cryptography Concepts

View Set

Chapter 32: Management of Patients with Immune Deficiency Disorders

View Set

Examen de punto de control: Acceso a la red

View Set

Calculate Mean (quizlet.live set)

View Set

ACT study guide Math: composite Functions

View Set

NU143- Chapter 18: Nursing Management of the Newborn

View Set