IS 355 1-6 Quizzes and Practice Test Questions
Which IEEE specification was a major driving force to encourage the use of unshielded twister-pair cabling for workstation connections and dominated early installations. 10Base2 10Base5 1000Base-T 10Base-T
10Base-T
What port number is associated with SSH 22 21 23 20
22
Which of the following is not true of routing? Routing is the process of directing a packet from one network to another until it reach its destination Many routers connect local area networks to a wide area network. A router cannot serve as a switch. Layer 3 routing uses the IP address to determine a packet's destination
A router cannot serve as a switch.
The __________ Protocol is used to associate a Data Link layer address with a Network layer address Link Layer Discovery Internet Address Resolution Network Translation
Address Resolution
Which of the following is a communication challenge experienced more often by government agencies than by businesses Limited customer base Managing time Competing demands for budget Addressing the demands of paper-based processes
Addressing the demands of paper-based processes
What is an expected impact on business by the Internet of Things (IoT)? Administrative delays will increases Devices are easily tracked Data will grow even faster Identity and authorizations management will become more complex
Administrative delays will increase
Which of the following cloud service models offers SaaS solutions as professional services and not just software? Infrastructure as a Service (IaaS) Anything else as a Service (Aaas) Software as a Service (SaaS) Platform as a Service (Paas)
Anything else as a Service (Aaas)
The layer of the OSI model that interacts with a human rather than another technological element is: Application Network Presentation Physical
Application
The layers of the TCP/IP Reference Model are Application, Presentation Network, and Physical Host-to-Host, Transport Network, and Data Link Application, Host-to-Host, Network, and Physical Host-to-Host, Session, Network, Access, and Data Link
Application, Host-to-Host, Network, and Physical
Carl is a network engineer. He is hardening a server to make it less vulnerable to attacks. What is the most secure method of handling open ports? Memorize each port and decide whether or not to block it Leave all ports open Apply the deny-all principle and enable only those ports that are needed. Close all ports and open them only when needed.
Apply the deny-all principle and enable only those ports that are needed.
Which classful network class uses the address range 128.0.0.0 to 191.255.255.255? Class C Class A Class D Class B
Class B
What allows the Internet Assigned Numbers Authority (IANA) to segment any address space to define larger or smaller networks as needed, giving far more flexibility to allocate networks of virtually any size without wasting larger blocks of IP addresses? Dot notation Fragmentation Classless Inter-Domain Routing (CIDR) Network address translation (NAT)
Classless Inter-Domain Routing (CIDR)
The HTTP request and response process is required for: Communications between a web browser and a web server. Telnet to establish a session with a host at another site file exchange between peer-to-peer applications Domain Name System (DNS) to convert fully qualified domain names (FQDNS) into numeric IP addresses.
Communications between a web browser and a web server.
Which of the following assures that only authorized users can access and view data A business continuity plan Integrity Confidentiality Radio frequency identification (RFID)
Confidentiality
Among the foundational layers of the OSI model, which layer uses Frames to forward data within local networks? Network Data Link Application Physical
Data Link
Which protocol requests and assigns IP addresses on a network? Voice over IP (VoIP) Dynamic Host Configuration Protocol (DHCP) Session Initiation Protocol (SIP) Internet Protocol (IP)
Dynamic Host Configuration Protocol (DHCP)
Which of the following is not true of Internet Protocol version 6 (IPv6) IPv6 addresses are 128-bit numbers IPv6 provides unique addresses for approximately 340 undecillion devices Dynamic Host Configuration Protocol (DHCP) cannot assign IPv6 addresses to devices on a network 2001:db8:45a5:200:f8bf:fe21:67cf is an example of an IPv6 address
Dynamic Host Configuration Protocol (DHCP) cannot assign IPv6 addresses to devices on a network
Which of the following is not true of the Open Systems Interconnection (OSI) Reference Model? It is made up of seven complementary but distinctly different layers Each layer carries out a discrete group of operations It is a theoretical model of networking with interchangeable layers Each layer's functionality is implemented in hardware.
Each layer's functionality is implemented in hardware.
True or False? Air (radio frequency) is not considered a type of network transmission medium
False
True or False? Analog devices transmit data using long and short electrical signals that represent letter of the alphabet.
False
True or False? Both IPv4 and IPv6 use checksums
False
True or False? In half-duplex mode, both ends of a connection can communicate simultaneously
False
True or False? Low port densities on switch ensure the lowest cost of connectivity
False
True or False? Multilayered hierarchical backbones are more restrictive than flat backbones
False
True or False? Networks are subject to a maximum distance or path length due to signal attenuation.
False
True or False? Running Wireshark in promiscuous mode ensures that the user only sees traffic destined for the machine on which it is running
False
True or False? Switches flood a network with traffic
False
True or False? The IPv6 addressing scheme has been the dominant scheme for several years
False
True or False? The OSI Network Layer provides flow control, fragmentation/reassembly, error control, and acknowledgement of delivery
False
True or False? The Physical Layer of the OSI model includes services for user programs that interact with network, such as email software.
False
True or False? Too little communication, but not too communication, can cause anxiety in consumers and business partner.
False
True or False? With a private cloud, the virtualization layer is owned and managed by the cloud service provider (CSP)
False
True or false? Layer 3 is within a local area network (LAN), whereas Layer 2 is outside a LAN
False
True or false? The business-to-government (B2G) model focuses citizens using government websites to make transactions, such as paying taxes.
False
What is a drawback of a collapsed backbone Central switched reduce the number of devices needed for other backbone topologies Using a central switch isolates traffic from other departmental LANs Tightly centralized equipment administration make management easier Fiber optic cabling is required to connect each departmental LAN to the central switch
Fiber optic cabling is required to connect each departmental LAN to the central switch
Which of the following is a common feature or characteristic of the business to consumer (B2C) model? Fixed or limited pricing Requests for proposal (RFPs) Strict constraints on allowed products, services, and activities High volume
Fixed or limited pricing
Which of the following is an OSI Layer 4 (Transport Layer) service that ensures the source and destination computers work together to detect when packets do not arrive within a reasonable time period, and then retransmit missing packets? Flow control Acknowledgment of delivery Error control Fragmentation/reassembly
Flow control
Which of the following relies most heavily on requests for proposal (RFPs) as the primary method of procuring services and products? Retail Banking and financial Government Travel
Government
Which of the following industries focuses on protecting PHI Banking/finance Travel Health Care Manufacturing
Health Care
Carl works for a government agency. As part of a business impact analysis, he is evaluating what business impact analysis, is evaluating what business functions are critical are critical to his agency's ability to remain operational after a disaster. Which of the following aspects of the agency's network would most significantly affect business continuity after a hurricane or flood? Bandwidth Network security Hosting infrastructure High availability
High availability
Software applications all begin as client/server architectures cloud computing architectures peer-to-peer architectures host-based architectures
Host-based architectures
Which of the following is a Transmissions Control Protocol (TCP) service that uses a request-response protocol in which a client sends a request and a server sends a response? Domain Name System (DNS) Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP)
Which of the following is an OSI Layer 3 (Network Layer) protocol that queries the status of devices or services and reports on those that are not available? AppleTalk Internet Protocol Security (IPSec) Internet Control Message Protocol (ICMP) Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
The Network and Transports layers of the OSI model correspond to which TCP/IP model layers Application and Transport Network and Application Internet and Network Internet and Transport
Internet and Transport
A communication solution project has several steps. Skipping one of the steps will likely result in a solution that falls short of the expected functionality and will probably waste resources. Which step is not crucial to the project? Define the scope of work Assign resources and time expectations to each work unit Monitor the solution to ensure it meets the organization's goals Keep track of issues during plan execution and address them in the future
Keep track of issues during plan execution and address them in the future
Which network topology offers multipoint connections and direct links between network devices Mesh Point-to-point Ring Bus
Mesh
Daniel is planning to switch his network from IPv4 to IPv6. He currently runs Address Resolution Protocol (ARP) to manage local Media Access Control (MAC) addresses. When he moves to IPv6, what protocol must he use instead of ARP? Neighbor Discovery Protocol (NDP) Any connection protocol Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP)
Neighbor Discovery Protocol (NDP)
Regarding the OSI Reference Model, OSI stands for Open Systems Intranet Open Systems Internet Open Systems Information Open Systems Interconnection
Open Systems Interconnection
Which of the following cloud service models is designed to support application development Infrastructure as a Service (IaaS) Software as a Service (SaaS) Anything else as a Service (Aaas) Platform as a Service (PaaS)
Platform as a Service (PaaS)
Dhruv is a network engineer. He wants to move much of his organization's data center infrastructure to the cloud. He wants maximum control over the infrastructure, but without the capital expenses involved in setting up and maintaining the infrastructure. Which of the following is the best solution for Dhruv? Platform as a Service (PaaS) Anything else as a Service (Aaas) Public Cloud Private Cloud
Private cloud
In the workplace, a message sender chooses a delivery method, such as email, instant messaging, or text messaging. Then the sender selects the appropriate recipient and composes a message. Which of the following is not true regarding this approach? This approach requires that every message sender understand the communication process and make the best delivery decision Reliable communications methods still require senders to monitor sent messages for errors or potentially missing messages. Most communication methods require that the sender know the recipient to send a message Not all message senders fully understand the impact of their delivery method decisions.
Reliable communications methods still require senders to monitor sent messages for errors or potentially missing messages.
A common OSI Layer 5 protocol is Dynamic Host configuration Protocol (DHCP) Transport Layer Security (TLS) Remote Procedure Call (RPC) Secure Shell (SSH)
Remote Procedure Call (RPC)
Which of the following is not true of resiliency and redundancy? Resiliency may duplicate effort and functionality, but it provides redundancy if any component fails. In terms of networks, resiliency is the ability to identify alternate routes around any failures to maintain uninterrupted packet delivery Redundancy means that there are multiple ways to carry out a task, such as transporting a communication to its destination
Resiliency may duplicate effort and functionality, but it provides redundancy if any component fails.
Of the following industries, in which is it most common for consumers to shop online for the best price before buying even moderately priced products or services? Banking and financial Health Care Manufacturing Retail
Retail
Which of the following correctly identifies a protocol or application and a common device associated with the Session Layer of the OSI model? Ethernet, fiber(cable) ICMP, Layer 3 Switch Wi-Fi (IEEE 802.11), network card SSH, firewall
SSH, firewall
Combining or integrating unified communications (UC) into which of the following can shorten sales cycles and increase revenues? Enterprise resource planning Service-oriented architecture Sales force automation Supply chain management
Sales force automation
A common OSI Layer 7 protocol is: Layer 2 Tunneling Protocol (L2TP) Transport Layer Security (TLS) Secure Shell (SSH) Session Initiation Protocol (SIP)
Session Initiation Protocol (SIP)
Which of the following is a User Datagram Protocol (UDP) service for sharing and collecting information about network devices? Simple Network Management Protocol (SNMP) File Transfer Protocol (FTP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP)
Simple Network Management Protocol (SNMP)
Of the following, which is the most convenient method of communicating simple messages quickly Text messaging Face-to-face meeting Telephone conversation Video conferencing
Text messaging
On a Windows machine, what effect does the command arp -d have on the machine's arp table The table is displayed the table is updated The table is indexed The table it cleared
The table is cleared
What challenge do enterprise and small businesses have in common They do not have the resources to provide excellent customer service Limited capabilities can make reaching customers challenging They tend to compete for the same customers They are not security savvy
They tend to compete for the same customers
True or False? A host-based application architecture represents a single point of failure.
True
True or False? A hybrid network topology is a network that contains several different topologies
True
True or False? A protocol stack is how software operates at different layers of the OSI model
True
True or False? A unified communications (UC) system can deny unauthorized contacts and redirect authorized contacts to authorized individuals.
True
True or False? ARPANET was the basis for today's Internet
True
True or False? An instance of a service listening for traffic on a specific port is called a socket.
True
True or False? Because small business have only a fraction of the customers of large organizations, the consequences of losing customers are more visible in small businesses
True
True or False? Because small businesses have only a fraction of the customers of large organizations, the consequences of losing customers are more visible in small businesses.
True
True or False? Building Industry Consulting Service International (BICSI) is a source for structured wiring standards.
True
True or False? Building Industry Consulting Service International (BICSI) is a source for structured wiring stands
True
True or False? Campus backbone networks are aggregations of multiple buildings on the same physical campus
True
True or False? Departmental local area networks are needed when workgroup connections are physically located in different wiring closets
True
True or False? Hyperconnectivity refers to always being online and connected.
True
True or False? IPv4 addresses are written as four separate 8-bit numbers separated by periods or dots.
True
True or False? Internet of Things (IoT) autonomy can move some administrative decisions into programs that do not need human interaction
True
True or False? One of the two primary Transport layer protocols, UDP is generally used when the application has both high packet-loss tolerance and speed requirements, such as with gaming or video streaming services.
True
True or False? Security is one reason and internetwork local area networks
True
True or False? Segmenting a network into multiple collision domains makes a network more efficient.
True
True or False? The OSI Network Layer provides network addressing for packets.
True
True or False? The Presentation Layer of the OSI model converts data into standard formats, such as American Standard Code for Information Interchange (ASCII), for application program use.
True
True or False? The Session Layer (OSI Layer 5) is the first layer that connects packets together into conversations
True
True or False? The primary difference between Ethernet II and the IEEE 802.3 Ethernet standards is the frame layout.
True
True or false? A challenge for organizations that are geographically spread out is effective communications throughout the organization
True
True or false? A virtual machine operate just like a physical computer
True
True or false? For some devices and software, multiple OSI model layers are combined and, in some cases, layers may be omitted
True
True or false? Frequent traveler cards with radio frequency identification (RFID) technology enable travelers to use the same card as the hotel room key.
True
True or false? Requests for proposals (RFPs) and subsequent contracts with government agencies often limit communication to specific parties in order to avoid undocumented information exchange.
True
True or false? Where as intranet is a private network within an organization's infrastructure, an extranet is remotely accessible network typically for business partners and suppliers.
True
All of the following are true of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), except UDP provides best effort with no guarantee of delivery UDP's primary service is packet routing. TCP provides a reliable end-to-end communication channel for IP packets TCP guarantees the delivery of each IP packet via a TCP
UDP's primary service is packet routing.
Which of the following is an example of an IP-based communication is Plain old telephone service (POTS) Voice over Internet Protocol (VoIP) Circuit-Switched Data (CSD) and High-Speed Circuit-Switched Data (HCSD) cellular networks Integrated Services Digital Network (ISDN) B-channel
Voice over Internet Protocol (VoIP)
Which of the following correctly identifies a protocol or application and a common device associated with the Data Link Layer of the OSI model? TLS, firewall Wi-Fi (IEEE 802.11), network card ICMP, Layer 3 Switch Ethernet, fiber (cable)
WIFI (IEEE 802.11), network card
All of the following are true of connection-orientated and connectionless protocols, except: a network cannot support both connectionless and connection-oriented protocols a connectionless protocol treats each message separately Internet Protocol is called a connectionless protocol A connection-oriented protocol is set up a connection between the source and destination, and all messages the two hosts exchange during the conversation use the same connection information
a network cannot support both connectionless and connection-oriented protocols.
On a circuit-switched network many conversations share the same network and use more of the network's capacity collisions and congestion are not issues transmission delay or latency can be high communications are inexpensive
collisions and congestion are not issues
Using multiple modes of business communications gives enterprise businesses the unique ability to Manage fewer employees develop a blended solution custom-fit for an enterprise identify specific business challenges. communicate across time zones
develop a blended solution custom-fit for an enterprise
Internet Protocol version 6 (IPv6) accomplishes all of the following except enables two or more devices that connect to the Internet to use the same IP address. improves IP network efficiency reduces Internet bandwidth use expands the number of available IP addresses
enables two or more devices that connect to the Internet to use the same IP address.
The Presentation Layer of the OSI model: on the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network. is the software entry point for sending messages to and from an application's users. sets up, manages, and terminates connections between applications on source and destination computers. serves as the primary interface for application software to interact with networks
on the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network.
What type of file does Wireshark use to store captured packets? pcap wcap fcaps cap
pcap
Ethernet networks todays are _______ to build and maintain more difficult and more expensive more difficult but less expensive simpler and less expensive simpler but more expensive
simpler and less expensive
Internet Protocol (IP) supports the concept of grouping packets together relies solely on the network address to determine each packet's next logical step as it travels to its destination provides packet routing and host identification to deliver packets to their destination is the primary protocol that relays packest across most of today's diverse networks
supports the concept of grouping packets together