INFX 240 Chapter 1 TestOut Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following tasks is associated with the Session layer? -Transmission synchronization -Connection establishment -Acknowledgement coordination -Host ID number assignment

Connection establishment (1.3.6)

Which of the following topologies connects each network device to a central hub? -Bus -Ring -Star -Mesh

Star (1.2.3)

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? -Bus -Ring -Mesh -Star

Star (1.2.3)

Which topologies is a CAN able to use? - AD hoc - Full Mesh - Ring - Bus - Star - Partial Mesh

- Ring - Bus - Star (1.1.5)

Which of the following functions are performed by the OSI Transport layer? (Select three.) -Data segmentation and reassembly -Path identification and selection -Reliable message delivery -End-to-end flow control -Consistent data formatting between dissimilar systems -Control media access, logical topology, device identification -Format packets for delivery through the media

-Data segmentation and reassembly -Reliable message delivery -End-to-end flow control (1.3.6)

Which of the following are functions of the MAC sublayer? (Select 2) -Defining a unique hardware address for each device on the network -Letting devices on the network have access to the LAN -Creating routing tables based on MAC addresses -Mapping hardware addresses to link-layer addresses

-Defining a unique hardware address for each device on the network -Letting devices on the network have access to the LAN (1.3.6)

In the OSI model, which of the following functions are performed at the Application layer? (Select all that apply) -Enabling communication between network clients and services -Conversation identification -Integrating network functionality into the host OS -Data translation

-Enabling communication between network clients and services -Integrating network functionality into the host operating system (1.3.6)

Which of the following are included as part of Data Link layer specifications? (select two) -Synchronizing individual bits as they are transmitted through the network -Identifying physical network devices -Composing electrical signals as they pass through the transmission medium -Controlling how messages are propagated through the network

-Identifying physical network devices -Controlling how messages are propagated through the network (1.3.6)

The UDP transport protocol provides which of the following features? (Select all that apply.) -Guaranteed delivery -Sequence numbers and acknowledgements -Low overhead -Connectionless datagram services

-Low overhead -Connectionless datagram services (1.4.5)

The Data Link Layer of the OSI model is comprised of two sublayers. What are they? -LAT -MAC -DLC -LLC -SAN

-MAC -LLC (1.3.6)

In the OSI model, which of the following functions are performed at the Presentation layer? (select two) -Maintain separate client connections -Specify data format (such as file formats) -Encrypt and compress data -Provide network services -Transmit data frames -Handle general network access, flow control, and error recovery

-Specify data format (such as file formats) -Encrypt and compress data (1.3.6)

What is the binary format for the following decimal IP address? 131.9.202.111 -binary number -binary number -binary number -binary number (NOTE: I do not have the patience to sit here and type all those 1s and 0s)

10000011.00001001.11001010.1101111 (1.5.3)

Match each decimal value on the left with the corresponding hexadecimal value on the right. Not all decimal values have a corresponding hexadecimal value. LEFT [ 11, 12, 13, 14, 15, 16, 17 ] RIGHT ( 11, B, D, F, C, 10 )

17 -> 11 11 -> B 13 -> D 15 -> F 12 -> C 16 -> 10 (1.5.3)

What is the decimal format of the following binary IP address? 11001110 . 00111010 . 10101010 . 01000011 - 238.90.202.99 - 206.58.170.67 - 190.42.154.51 - 205.57.169.66

206.58.170.67 (1.5.3)

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more than once. LEFT [Host-to-Host, Internet, Network Access, Application] RIGHT (Presentation, Data Link, Application, Session, Network, Transport)

Application -> Presentation Network Access -> Data Link Application -> Application Application -> Session Internet -> Network Host-to-Host -> Transport (1.3.6)

Which of the following topologies connects all devices to a trunk cable? -Bus -Star -Ring -Tree

Bus (1.2.3)

You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have? -Extranet -Intranet -Client-server -Peer-to-peer

Client-server (1.1.5)

What is the basic purpose of the OSI Physical layer? -Coordinates rules for transmitting bits -Coordinates rules for managing network servers -Coordinates rules for routing packets -Defines basic physical structures, such as disks

Coordinates rules for transmitting bits (1.3.6)

Which protocol is used on the World Wide Web to transmit web pages to web browsers? -SMTP -HTML -NNTP -HTTP

HTTP (Hypertext Transfer Protocol) (1.4.5)

Match the networking function or device on the left with its associated OSI model layer on the right. LEFT [Session ID number, ASCII, Port Numbers, Router, Modem, HTTP, Switch] RIGHT (Application, Presentation, Session, Transport, Network, Data Link, Physical)

HTTP -> Application ASCII -> Presentation Session ID Number -> Session Port Numbers -> Transport Router -> Network Switch -> Data Link Modem -> Physical (1.3.6)

Which protocol is used to securely browse a website? -UDP -SIP -HTTPS -SSH -ARP

HTTPS (1.4.5)

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? -IP -ICMP -IGMP -ARP -DHCP -TCP

ICMP (Internet Control message Protocol (1.4.5)

Which of the following protocols stores email on the mail server and allows users to access messages from various client devices without having to download the emails? -IMAP4 -SMTP -POP3 -NTP

IMAP4 (1.4.5)

You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sale team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol is designed for this purpose? -POP4 -SMTP -MFTP -POP3 -IMAP4

IMAP4 (1.4.5)

You have implemented an ad hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network? -Star -Mesh -Ring -Bus -Tree

Mesh (1.2.3)

You want to implement a fault tolerant topology as you connect routers on your wide area network. Which of the following topologies meets your needs? -Star -Bus -Ring -Mesh

Mesh (1.2.3)

Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? -Star -Ring -Mesh -Bus

Mesh (1.2.3)

You have a network that uses a logical bus topology. How do messages travel through the network? -Messages are sent to a central device that forwards them to the destination devices -Messages are broadcast to all devices connected to the network -Messages travel from one device to the next until they reach the destination device -Messages are sent directly to he correct destination device.

Messages are broadcast to all devices connected to the network (1.2.3)

You have a network that uses a logical ring topology. How do messages travel through the network? -Messages are sent directly to the destination device only -Messages are sent to all devices connected to the network -Messages are sent to a central device that forwards them to the destination devices -Messages travel from one device to the next until they reach the destination device.

Messages travel from one device to the next until they reach the destination device (1.2.3)

Which of the following geographic network types are typically managed by a city as a public utility? -Personal area network (PAN) -Wide area network (WAN) -Local area network (LAN) -Metropolitan area network (MAN)

Metropolitan area network (MAN) (1.1.5)

Which of the following functions are performed at the Physical layer of the OSI model? -Provisioning environments where you can run network applications -Enabling network services -Moving data across network cables -Conversation identification -Data translation

Moving data across network cables (1.3.6)

You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use? -SMTP -NTP -SNMP -NNTP -SAP

NTP (Network Time Protocol) (1.4.5)

Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server? -SPC -SMTP -FTP -POP3 -SNMP

POP3 (1.4.5)

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? -Star -Bus -Partial Mesh -Full Mesh

Partial Mesh (1.2.3)

You have implemented a network where each device provides all other devices on the network with access to shared files? -Polling -Peer-to-peer -Multiple access -Client-Server

Peer-to-peer (1.1.5)

In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? -Tree -Ring -Bus -Star

Ring (1.2.3)

Which of the following topologies connects each device to a neighboring device? -Bus -Tree -Ring -Star

Ring (1.2.3)

In the OSI model, what is the primary function of the Network Layer? -Ensures that packets are delivered with no loss or duplication -Transmits data frames -Allows applications to establish, use, and end a connection -Routes messages between networks

Routes messages between networks (1.3.6)

What protocol sends email to a mail server? -POP3 -FTP -SMTP -TFTP -SNMP

SMTP (1.4.5)

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each networks uses an email package from a different vendor. Which TCP/IP protocol will enable message exchange between systems? -POP3 -SMTP -FTP -ICMP -IMAP4

SMTP (Simple Mail Transfer Protocol) (1.4.5)

What device is used to create a physical star topology? -Bridge -Switch -Router -Firewall

Switch (1.2.3)

Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes? -TCP -UCP -UDP -UDB

TCP (1.4.5)

You are an application developer, and you are writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability? -FTP -TCP -UDP -RIP -TFTP -IP

TCP (Transmission Control Protocol) (1.4.5)

Which OSI model layer is responsible for guaranteeing reliable message delivery? -Data Link -Session -Transport -Application

Transport (1.3.6)

During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. (Not all layers have a matching information format.) LEFT [Packets, Segments, Bits, Frames] RIGHT (Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer)

______________ -> Session Layer Segments -> Transport Layer Packets -> Network Layer Frames -> Data Link Layer Bits -> Physical Layer (1.3.6)


संबंधित स्टडी सेट्स

Renaissance and Baroque Art Midterm 1

View Set

CPCU 551- Addressing Commercial Property Risk

View Set

Nur210: Exam 2 Study Questions Online ATI

View Set

Microbiology: Gram-Negative Bacilli

View Set

Chapter 35: Nationalism and Political Identities in Asia, Africa, and Latin America

View Set