Google IT Support Cert - Computer Networking - Comprehensive Quizlet
A domain name is the term used for something that can be resolved by ____?
Domain name system (DNS)
Which protocol is used to communicate errors that may occur across a network?
Internet Control Message Protocol (ICMP)
Which protocol is known as the heart of the internet?
Internet Protocol
Which protocol is responsible for getting data from one node to another?
Internet Protocol
TRUE OR FALSE - Cloud computing is the concept of a physical machine and a logical machine abstracted away from each other.
True
TRUE OR FALSE - DNS is a global and highly distributed network service that resolves strings of letters into IP addresses.
True
TRUE OR FALSE - For reliability, copper cable would be preferable.
True
TRUE OR FALSE - IP addresses belong to the networks, not the devices attached to those networks.
True
In its shortened form, " ::1 " is the loopback address for IPv6 (T/F)
True
The IPv6 loopback address is _____.
0000:0000:0000:0000:0000:0000:0000:0001
At the very lowest level, all computers really understand are ____?
1 and 0
Choose all of the frequencies that wireless networks typically operate on. -5Ghz -2.4Ghz -1.544Ghz -88Mhz
-5Ghz -2.4Ghz
Which of the following statements accurately describe the differences between a hub and a switch? Select all that apply. -A hub causes larger collision domains. -A switch remembers which devices are connected on each surface, while a hub does not. -Hubs are more sophisticated versions of switches. -A hub is a physical layer device, and a switch is a data link layer device.
-A hub causes larger collision domains. -A switch remembers which devices are connected on each surface, while a hub does not. -A hub is a physical layer device, and a switch is a data link layer device.
What are the four things that all computers need configured in order to operate on a modern network? Check all that apply. -A subnet mask -An IP address -An NTP server -A TCP port -A name server -A default gateway -A MAC address
-A subnet mask -An IP address -A name server -A default gateway
How many bits are reserved for the Transmission Control Protocol (TCP) flags?
6
For all IPv6 addresses, the network ID is always the first ______ bits.
64
What's the standard number for a TTL field?
64
An example of something that operates at the application layer is: UDP A router TCP A web browser
A web browser
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used? Check all that apply. -Datagrams -IPv4 Tunnels -Packets -IPv6 tunnels
-Datagrams -IPv6 tunnels
What two benefits are a result of configuring a wireless mesh network? Check all that apply. -WiFi protected setup -Range -Ad-hoc configuration -Performance
-Range -Performance
Which of the following are protocols used in the Transport layer? Check all that apply. -Ethernet -TCP -UDP -IP
-TCP -UDP
Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below. -The session layer -The encryption layer -The interconnection layer -The compression layer -The presentation layer
-The session layer -The presentation layer
Select all statements that are true of cable internet connections. -They're wireless connections. -They're broadband connections. -They're shared bandwidth connections. -They're dial-up connections.
-They're broadband connections. -They're shared bandwidth connections.
Please select all valid TCP control flags. -URG -WAIT -RST -LISTEN -CLOSE -ACk
-URG -RST -ACK
When using the netcat command to test a network port, which option will provide output that is not useful for scripting, but is useful for the human eye?
-v
An IPv6 address is how many bits long?
128
IPv6 addresses are ________ bits in size.
128
How many root servers are there?
13
How many bits are in the checksum field in a Transmission Control Protocol (TCP) header?
16
How many bits are used to direct traffic to specific services running on a networked computer?
16
What size is an Internet Protocol (IP) v6 payload field?
16-bit
A complete Fully Qualified Domain Name (FQDN) is limited to how many characters?
255
A fully qualified domain name can contain how many characters?
255
IP addresses are a ______ bit long numbers made up of four octets, and each octet is normally described in decimal numbers.
32
How many address fields does an 802.11 header have?
4
The total number of IPv4 addresses is approximately:
4.2 billion
One of Level 3's public DNS servers is ____________.
4.2.2.3
How many bits does WEP (Wired Equivalent Privacy) use?
40
What port on a name server is used for User Datagram Protocol (UDP) name request packets?
53
Which of the options below represents the correct & most fully compressed version of the IPv6 address: 7d2b:00a9:a0c4:0000:a772:00fd:a523:0358
7d2b:a9:a0c4:0:a772:fd:a523:358
One of Google's public DNS servers is 8.8.8.8. The other one is ______.
8.8.4.4
How many zeros are found at the beginning of an Internet Protocol (IP) v6 address that correlate to a v4 address?
80
The traditional port for HTTP or unencrypted web traffic is port _____.
80
What is a cyclical redundancy check?
A mathematical calculation used to ensure that all data arrived intact
Wireless networks configured where nodes all speak directly to each other are known as what?
Ad-hoc
Which form of Digital Subscriber Line (DSL) features differing upload and download speeds?
ADSL
In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
Ad-hoc
Select all that are true. -One domain name can point to one IP. -Many domain names can point to the same IP. -One domain name can point to many IPs.
All are true.
An A Record contains what?
An IPv4 address
The number range of how many IPv6 domain address which can be provided is ____.
An Undecillion
During the name resolution process, which technique is used to avoid congestion when querying a server?
Anycast
Modems communicate data by using which method?
Audible wavelengths
Which allocation method can be used with a Dynamic Host Configuration (DHCP) server to assign the same address to the same machine if possible?
Automatic
You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determine the most optimal path to forward the traffic?
Border Gateway Protocol (BGP)
What does a wireless LAN (WLAN) act as to a wired network?
Bridge
The transmission method that sends data to every device on a LAN is known as a _____ transmission.
Broadcast
A DNS record that's used to redirect traffic from one domain name to another is known as a _______ record.
CNAME
Which connection technology uses what is known as a CMTS?
Cable Internet
Within the Ethernet frame, one of the most widely used methods of detection of errors in data is known as _______?
Checksum
Which of the following IP address classes do NOT exist?
Class Z
What is the name of the provision of services based around hardware virtualization?
Cloud computing
__________, generally used by cable television delivery into a person's home, are capable of transmitting much more data than what was required for TV viewing.
Coaxial cables
A network segment where only one device can communicate at a time is known as a _____.
Collision domain
What type of cable communicates binary data by changing the voltage between two ranges?
Copper
When an electrical pulse on one wire is accidentally detected on another nearby wire, this is known as _____.
Cross talk
The process by which a client configured to use DHCP attempts to get network configuration information is known as _________________.
DHCP Discovery
The final step of the DHCP Discovery process is known as ______.
DHCPACK
The more accurate name for a modem used for a DSL connection is a ______.
DSLAM
Which layer abstracts away the need for any other layers to care about what hardware is in use?
Data Link Layer
One of the benefits of Cloud Storage is protection against __________?
Data loss
In a TCP header, the __________ is the port of the service the traffic is intended for.
Destination port
Which of the following is NOT one of the four of the most common broadband solutions available today? Cable broadband Digital Subscriber Lines Dial-up Internet Fiber connections
Dial-up Internet
TRUE OR FALSE - T-carrier technologies were originally invented by AT&T in order to transmit multiple phone calls over a single link.
Disaster relief professionals often use an ____________ to communicate with each other while they perform search and rescue efforts.
A Transmission Control Protocol (TCP) connection is in working order and both sides can send each other data. What is the TCP socket state?
ESTABLISHED
Which of the options below represents the correct & most fully compressed version of the IPv6 address: 00eb:0000:0000:0000:d8c1:0946:0272:879
Eb::d8c1:946:272:879
The ping utility sends what message type?
Echo Request
One of the most popular Software as a Service (SaaS) examples is ________?
The protocol most widely used to send data across individual links is known as _______?
Ethernet
TRUE OR FALSE - In computer logic, a zero represents true and a one represents false.
False
The following IP address is fully compressed to the shortest form possible: 9930:cafa:0000:0052:04cc:7b7a:0037:27e6 → 9930:cafa:0:052:4cc:7b7a:037:27e6. (T/F)
False
For delivering data at a faster speed, which type of cable would be preferable?
Fiber
________ allows for data transmissions to travel much farther without degradation of the signal.
Fiber
FTTP stands for _______.
Fiber to the Premises
The TCP control flag FIN stands for ____?
Finish
A ________ is just a device that blocks traffic that meets certain criteria.
Firewall
A device that blocks traffic that meets certain criteria is know as a ________.
Firewall
The phrase TCP/IP represents how many protocols?
Four
What's the difference between full and half duplex?
Full duplex allows communications in two directions at the same time; half duplex means that only one side can communicate at a time.
A ________ is a way for two devices to ensure that they're speaking the same protocol and will be able to understand each other.
Handshake
Which Internet Protocol (IP) v6 field is identical in purpose to the TTL field in an IPv4 header?
Hop Limit
A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used?
Hybrid
Administration and definition of TLDs are handled by a non-profit organization known as _______.
ICANN
The organization responsible for DNS at a global level is ________.
ICANN
A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?
ICMP
The protocol used to communicate network errors is known as __________.
ICMP
When troubleshooting Domain Name System (DNS) problems, which helpful feature do public servers usually support?
ICMP echo requests
Which of the following is an example of a network layer (layer 3) protocol? (One answer) -UDP -TCP -IP -Ethernet
IP
The Internet Assigned Numbers Authority (IANA) has been in charge of distributing ________ since 1988.
IP addresses
ICMP stands for ________.
Internet Control Message Protocol
What is the purpose of DNS round robin technique?
It's to balance traffics.
What is the type of modulation used by twisted pair cable computer networks known as?
Line coding
What does LAN stand for?
Local area network
An Internet connection problem for customers is found to be outside a carrier's regional office. As a result, which area needs troubleshooting?
Local loop
The physical address assigned to a device by a manufacturer is also known as a _____ address?
MAC
The resource record type MX stands for ____?
Mail exchange
Which configuration is considered to be a common way to increase security in a wireless network?
Media Access Control (MAC) filtering
Ones and zeros are sent across those network cables through a process called ________?
Modulation
What process sends ones and zeroes across network cables?
Modulation
____ is technology to help keeps network secure and preserve precious IP address space.
NAT
What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model does IP use?
Network
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes?
Network
As an IT decision maker, you plan to satisfy business needs by using software as a service. Which option do you deploy?
Office 365
Cellular network towers are configured in such a way so that they avoid what type of problem?
Overlap
Cat5 and Cat6 cabling refer to which reference model layer?
Physical
What's the right order of the TCP/IP Five-layer network model?
Physical Layer > Data link Layer > Network Layer > Transport Layer > Application Layer
Using the ________ tool is a way to determine if you can reach a certain computer from another one.
Ping
The Public Switched Telephone Network or PSTN is also sometimes referred to as POTS. What does the acronym POTS stand for?
Plain Old Telephone Service
In cloud computing, the acronym PaaS stands for ____?
Platform as a Service
PaaS stands for ______.
Platform as a Service
What technique allows for inbound traffic through a NAT?
Port forwarding
The transport layer handles multiplexing and demultiplexing through what type of device?
Ports
A defined set of standards that computers must follow in order to communicate properly is called a _______?
Protocol
A defined set of standards that computers must follow in order to communicate properly is known as a _____.
Protocol
What is the most common plug used with twisted pair network cables?
Registered Jack 45
With TCP, a source port is needed so that when the web server replies, the computer making the original request can send this data to the program that was ___________?
Requesting it
An IT engineer is planning a website upgrade with load balancing features. What technology is used?
Reverse proxy
There are 13 _____ name servers.
Root
What ordering of TCP flags makes up the Three-way Handshake?
SYN, SYN/ACK, ACK
Office 365 Outlook is an example of _______.
SaaS
In what order will the Transmission Control Protocol (TCP) generally send all segments?
Sequential
Cable Internet access can be described with which feature?
Shared bandwidth
In a TCP header, a ___________ is a high numbered port chosen from a special section of ports known as ephemeral ports.
Source port
Which field in a Transmission Control Protocol (TCP) header is chosen from ephemeral ports?
Source port
Which device is more common today, a network switch or a network hub?
Switch
Which one of the following technology would you use if your manager asked you to configure the network setting for every desktop in your company?
Switch
The TCP control flag SYN stands for ____?
Synchronize
The most common example of a connection-oriented protocol is _____. -IP -UDP -TCP
TCP
On Windows, one of the tools you can use to verify connectivity to a specific port is ________.
Test-NetConnection
What does a value of one in an ACK control flag represent?
The acknowledgement number field should be examined.
Where is the Start Frame Delimiter (SFD) found in an ethernet frame?
The last byte of the preamble
In the five-layer network model, at which layer are protocols first introduced?
The data link layer
You need to identify the manufacturer of a network interface. Where will you look for this information?
The first three octets of a Media Access Control (MAC) address
In the early years of the Internet, the basic infrastructure used was ____?
The public telephone network
Any given domain name has how many primary parts?
Three
The address class system is a way of defining how the global IP address space is divided. How many primary types of address classes exist?
Three
.com, .net, .edu are known as ____.
Top level domains
_________ is a utility that lets you discover the paths between two nodes and provides information about each hop along the way.
Traceroute
In the transport layer, which protocol is used to get data to the right application?
Transmission Control Protocol
T1 is short for __________.
Transmission System 1.
TRUE OR FALSE - In most cases, static IP addresses are reserved for servers and network devices, while dynamic IP addresses are reserved for clients.
True
TRUE OR FALSE - In network layered models, the protocols at each layer carry the ones above them in order to get data from one place to the next.
True
TRUE OR FALSE - Network address translation takes one IP address and translates it into another.
True
TRUE OR FALSE - TCP, as a protocol, is universal in how it's used since every device speaking to TCP protocol has to do this in the exact same way for communications to be successful.
True
TRUE OR FALSE - The process by which a client configured to use DHCP attempts to get network configuration information is known as DHCP discovery.
True
TRUE OR FALSE - You can tell what address class an IP address belongs to just by looking at it.
True
The following IP address is fully compressed to the shortest form possible: 0e56:11c2:0e75:8d23:3528:7e0d:419b:bdce → e56:11c2:e75:8d23:3528:7e0d:419b:bdce (T/F)
True
Binary is made up of how many parts?
Two
What transport layer protocol does DNS normally use?
UDP
What is the biggest difference between TCP and UDP?
UDP is connectionless.
What type of transmission will have a zero in a special bit in the destination Media Access Control (MAC) address?
Unicast
The technique that allows you to have multiple logical LANs operating on the same physical equipment is known as a _____.
VLAN
VPN stands for _______.
Virtual Private Network
The original and flawed wireless security protocol is known as _____.
WEP
What type of scenario should you use the User Datagram Protocol (UDP)?
When you are streaming a video
WPA stands for _______.
WiFi Protected Access
WAN stands for ______________.
Wide Area Network.
Counting in Binary starts with which digit?
Zero
A hybrid cloud is ________________.
a combination of a public cloud and a private cloud
In a WAN, the area between a demarcation point and the ISP's core network is known as ___________.
a local loop
Two-factor authentication is_________________________.
a method where you need more than a username and a password.
The term broadband is used to refer to any connectivity technology that isn't ________?
dial-up Internet
The acronym DNS stands for ____?
domain name system
Networks can connect a new device and an IP address can be assigned to it automatically through a protocol known as __________?
dynamic host configuration protocol
Different WiFi 802.11 standards generally use the same basic protocol, but might operate at different ___________.
frequency bands
The IPv6 header field that indicates how many routers can forward a packet before it's discarded is called the ________.
hop limit field
A piece of software that runs and manages virtual machines is known as a __________.
hypervisor
A tech uses the netcat tool on a Linux system. Of the choices, which has proper syntax?
nc google.com 80
TCP is a protocol that's reliant on _______?
network administrators
A DNS resolver tool available on all major desktop operating systems is __________.
nslookup
Which command line tool would you use to find the IP address for a given domain name?
nslookup
Ports 1024-49151 are known as ______ ports.
registered
A point-to-point VPN is also known as a ______________.
site-to-site VPN
VPNs are known as a _____ protocol.
tunneling
The very first field in an IPv6 header is the _______.
version field
IANA has primarily been responsible with assigning address blocks to five regional internet registries (RIR). A tech needs to research address blocks assigned in the United States. Which RIR should the tech contact?
ARIN
A device involved in a Transmission Control Protocol (TCP) connection is ready to close the connection. The other device in the connection agrees. What has occured?
Four-way handshake
Which of the following are examples of layers of our five-layer network model? Select all that apply. -Transport Layer -Presentation Layer -Application Layer -Physical Layer
Transport Layer Application Layer Physical Layer
A wireless channel is ____________.
a portion of a frequency band.
NAT addresses concerns over the dwindling IPv4 address space by ___________________.
allowing computers using non-routable address space to communicate with the Internet.
HTTP is an example of a(n) ______ layer protocol.
application
The "www" portion of a domain is known by which of the given options? Check all that apply. -Host name -Top Level Domain (TLD) name -Subdomain -Dynamic Host Configuration Protocol (DHCP)
-Host name -Subdomain
How fast is a T1 line?
1.544 Mb/sec
Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field?
16 bits
Network Address Translation (NAT) is typically implemented with which hardware devices? Check all that apply. -Firewalls -Hub -Routers -Switches
-Firewalls -Routers
When using Fixed Allocation DHCP, what's used to determine a computer's IP?
A MAC address
What's the difference between a client and a server?
A client requests data, and a server responds to that request.
What's a router?
A device that knows how to forward data between independent networks
A DNS TTL determines what?
How long a DNS entry is allowed to be cached
You have installed a device at the physical layer. All of the systems you connect to this device will talk to each other at the same time. What have you installed?
Hub
A company moves a popular website to a new web host. Which of the following will change as a result?
Internet Protocol (IP) address
MX stands for ________.
Mail exchange
What service acts on behalf of a client in order to access another service?
Proxy Server
Another term for POTS, or the Plain Old Telephone System, is _______________.
Public Switched Telephone Network.
Application layer data lives in the _____ section of the transport layer protocol.
data payload
The rate at which a dial-up connection can send data across a telephone wire is known as a _____ rate.
baud
A baud rate is a measurement of the number of ______________________.
bits that can be sent across a telephone line every second.
A proxy is something that _______________________.
communicates on behalf of something else.