IS 355 1-6 Quizzes and Practice Test Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which IEEE specification was a major driving force to encourage the use of unshielded twister-pair cabling for workstation connections and dominated early installations. 10Base2 10Base5 1000Base-T 10Base-T

10Base-T

What port number is associated with SSH 22 21 23 20

22

Which of the following is not true of routing? Routing is the process of directing a packet from one network to another until it reach its destination Many routers connect local area networks to a wide area network. A router cannot serve as a switch. Layer 3 routing uses the IP address to determine a packet's destination

A router cannot serve as a switch.

The __________ Protocol is used to associate a Data Link layer address with a Network layer address Link Layer Discovery Internet Address Resolution Network Translation

Address Resolution

Which of the following is a communication challenge experienced more often by government agencies than by businesses Limited customer base Managing time Competing demands for budget Addressing the demands of paper-based processes

Addressing the demands of paper-based processes

What is an expected impact on business by the Internet of Things (IoT)? Administrative delays will increases Devices are easily tracked Data will grow even faster Identity and authorizations management will become more complex

Administrative delays will increase

Which of the following cloud service models offers SaaS solutions as professional services and not just software? Infrastructure as a Service (IaaS) Anything else as a Service (Aaas) Software as a Service (SaaS) Platform as a Service (Paas)

Anything else as a Service (Aaas)

The layer of the OSI model that interacts with a human rather than another technological element is: Application Network Presentation Physical

Application

The layers of the TCP/IP Reference Model are Application, Presentation Network, and Physical Host-to-Host, Transport Network, and Data Link Application, Host-to-Host, Network, and Physical Host-to-Host, Session, Network, Access, and Data Link

Application, Host-to-Host, Network, and Physical

Carl is a network engineer. He is hardening a server to make it less vulnerable to attacks. What is the most secure method of handling open ports? Memorize each port and decide whether or not to block it Leave all ports open Apply the deny-all principle and enable only those ports that are needed. Close all ports and open them only when needed.

Apply the deny-all principle and enable only those ports that are needed.

Which classful network class uses the address range 128.0.0.0 to 191.255.255.255? Class C Class A Class D Class B

Class B

What allows the Internet Assigned Numbers Authority (IANA) to segment any address space to define larger or smaller networks as needed, giving far more flexibility to allocate networks of virtually any size without wasting larger blocks of IP addresses? Dot notation Fragmentation Classless Inter-Domain Routing (CIDR) Network address translation (NAT)

Classless Inter-Domain Routing (CIDR)

The HTTP request and response process is required for: Communications between a web browser and a web server. Telnet to establish a session with a host at another site file exchange between peer-to-peer applications Domain Name System (DNS) to convert fully qualified domain names (FQDNS) into numeric IP addresses.

Communications between a web browser and a web server.

Which of the following assures that only authorized users can access and view data A business continuity plan Integrity Confidentiality Radio frequency identification (RFID)

Confidentiality

Among the foundational layers of the OSI model, which layer uses Frames to forward data within local networks? Network Data Link Application Physical

Data Link

Which protocol requests and assigns IP addresses on a network? Voice over IP (VoIP) Dynamic Host Configuration Protocol (DHCP) Session Initiation Protocol (SIP) Internet Protocol (IP)

Dynamic Host Configuration Protocol (DHCP)

Which of the following is not true of Internet Protocol version 6 (IPv6) IPv6 addresses are 128-bit numbers IPv6 provides unique addresses for approximately 340 undecillion devices Dynamic Host Configuration Protocol (DHCP) cannot assign IPv6 addresses to devices on a network 2001:db8:45a5:200:f8bf:fe21:67cf is an example of an IPv6 address

Dynamic Host Configuration Protocol (DHCP) cannot assign IPv6 addresses to devices on a network

Which of the following is not true of the Open Systems Interconnection (OSI) Reference Model? It is made up of seven complementary but distinctly different layers Each layer carries out a discrete group of operations It is a theoretical model of networking with interchangeable layers Each layer's functionality is implemented in hardware.

Each layer's functionality is implemented in hardware.

True or False? Air (radio frequency) is not considered a type of network transmission medium

False

True or False? Analog devices transmit data using long and short electrical signals that represent letter of the alphabet.

False

True or False? Both IPv4 and IPv6 use checksums

False

True or False? In half-duplex mode, both ends of a connection can communicate simultaneously

False

True or False? Low port densities on switch ensure the lowest cost of connectivity

False

True or False? Multilayered hierarchical backbones are more restrictive than flat backbones

False

True or False? Networks are subject to a maximum distance or path length due to signal attenuation.

False

True or False? Running Wireshark in promiscuous mode ensures that the user only sees traffic destined for the machine on which it is running

False

True or False? Switches flood a network with traffic

False

True or False? The IPv6 addressing scheme has been the dominant scheme for several years

False

True or False? The OSI Network Layer provides flow control, fragmentation/reassembly, error control, and acknowledgement of delivery

False

True or False? The Physical Layer of the OSI model includes services for user programs that interact with network, such as email software.

False

True or False? Too little communication, but not too communication, can cause anxiety in consumers and business partner.

False

True or False? With a private cloud, the virtualization layer is owned and managed by the cloud service provider (CSP)

False

True or false? Layer 3 is within a local area network (LAN), whereas Layer 2 is outside a LAN

False

True or false? The business-to-government (B2G) model focuses citizens using government websites to make transactions, such as paying taxes.

False

What is a drawback of a collapsed backbone Central switched reduce the number of devices needed for other backbone topologies Using a central switch isolates traffic from other departmental LANs Tightly centralized equipment administration make management easier Fiber optic cabling is required to connect each departmental LAN to the central switch

Fiber optic cabling is required to connect each departmental LAN to the central switch

Which of the following is a common feature or characteristic of the business to consumer (B2C) model? Fixed or limited pricing Requests for proposal (RFPs) Strict constraints on allowed products, services, and activities High volume

Fixed or limited pricing

Which of the following is an OSI Layer 4 (Transport Layer) service that ensures the source and destination computers work together to detect when packets do not arrive within a reasonable time period, and then retransmit missing packets? Flow control Acknowledgment of delivery Error control Fragmentation/reassembly

Flow control

Which of the following relies most heavily on requests for proposal (RFPs) as the primary method of procuring services and products? Retail Banking and financial Government Travel

Government

Which of the following industries focuses on protecting PHI Banking/finance Travel Health Care Manufacturing

Health Care

Carl works for a government agency. As part of a business impact analysis, he is evaluating what business impact analysis, is evaluating what business functions are critical are critical to his agency's ability to remain operational after a disaster. Which of the following aspects of the agency's network would most significantly affect business continuity after a hurricane or flood? Bandwidth Network security Hosting infrastructure High availability

High availability

Software applications all begin as client/server architectures cloud computing architectures peer-to-peer architectures host-based architectures

Host-based architectures

Which of the following is a Transmissions Control Protocol (TCP) service that uses a request-response protocol in which a client sends a request and a server sends a response? Domain Name System (DNS) Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) File Transfer Protocol (FTP)

Hypertext Transfer Protocol (HTTP)

Which of the following is an OSI Layer 3 (Network Layer) protocol that queries the status of devices or services and reports on those that are not available? AppleTalk Internet Protocol Security (IPSec) Internet Control Message Protocol (ICMP) Internet Protocol (IP)

Internet Control Message Protocol (ICMP)

The Network and Transports layers of the OSI model correspond to which TCP/IP model layers Application and Transport Network and Application Internet and Network Internet and Transport

Internet and Transport

A communication solution project has several steps. Skipping one of the steps will likely result in a solution that falls short of the expected functionality and will probably waste resources. Which step is not crucial to the project? Define the scope of work Assign resources and time expectations to each work unit Monitor the solution to ensure it meets the organization's goals Keep track of issues during plan execution and address them in the future

Keep track of issues during plan execution and address them in the future

Which network topology offers multipoint connections and direct links between network devices Mesh Point-to-point Ring Bus

Mesh

Daniel is planning to switch his network from IPv4 to IPv6. He currently runs Address Resolution Protocol (ARP) to manage local Media Access Control (MAC) addresses. When he moves to IPv6, what protocol must he use instead of ARP? Neighbor Discovery Protocol (NDP) Any connection protocol Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP)

Neighbor Discovery Protocol (NDP)

Regarding the OSI Reference Model, OSI stands for Open Systems Intranet Open Systems Internet Open Systems Information Open Systems Interconnection

Open Systems Interconnection

Which of the following cloud service models is designed to support application development Infrastructure as a Service (IaaS) Software as a Service (SaaS) Anything else as a Service (Aaas) Platform as a Service (PaaS)

Platform as a Service (PaaS)

Dhruv is a network engineer. He wants to move much of his organization's data center infrastructure to the cloud. He wants maximum control over the infrastructure, but without the capital expenses involved in setting up and maintaining the infrastructure. Which of the following is the best solution for Dhruv? Platform as a Service (PaaS) Anything else as a Service (Aaas) Public Cloud Private Cloud

Private cloud

In the workplace, a message sender chooses a delivery method, such as email, instant messaging, or text messaging. Then the sender selects the appropriate recipient and composes a message. Which of the following is not true regarding this approach? This approach requires that every message sender understand the communication process and make the best delivery decision Reliable communications methods still require senders to monitor sent messages for errors or potentially missing messages. Most communication methods require that the sender know the recipient to send a message Not all message senders fully understand the impact of their delivery method decisions.

Reliable communications methods still require senders to monitor sent messages for errors or potentially missing messages.

A common OSI Layer 5 protocol is Dynamic Host configuration Protocol (DHCP) Transport Layer Security (TLS) Remote Procedure Call (RPC) Secure Shell (SSH)

Remote Procedure Call (RPC)

Which of the following is not true of resiliency and redundancy? Resiliency may duplicate effort and functionality, but it provides redundancy if any component fails. In terms of networks, resiliency is the ability to identify alternate routes around any failures to maintain uninterrupted packet delivery Redundancy means that there are multiple ways to carry out a task, such as transporting a communication to its destination

Resiliency may duplicate effort and functionality, but it provides redundancy if any component fails.

Of the following industries, in which is it most common for consumers to shop online for the best price before buying even moderately priced products or services? Banking and financial Health Care Manufacturing Retail

Retail

Which of the following correctly identifies a protocol or application and a common device associated with the Session Layer of the OSI model? Ethernet, fiber(cable) ICMP, Layer 3 Switch Wi-Fi (IEEE 802.11), network card SSH, firewall

SSH, firewall

Combining or integrating unified communications (UC) into which of the following can shorten sales cycles and increase revenues? Enterprise resource planning Service-oriented architecture Sales force automation Supply chain management

Sales force automation

A common OSI Layer 7 protocol is: Layer 2 Tunneling Protocol (L2TP) Transport Layer Security (TLS) Secure Shell (SSH) Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP)

Which of the following is a User Datagram Protocol (UDP) service for sharing and collecting information about network devices? Simple Network Management Protocol (SNMP) File Transfer Protocol (FTP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP)

Simple Network Management Protocol (SNMP)

Of the following, which is the most convenient method of communicating simple messages quickly Text messaging Face-to-face meeting Telephone conversation Video conferencing

Text messaging

On a Windows machine, what effect does the command arp -d have on the machine's arp table The table is displayed the table is updated The table is indexed The table it cleared

The table is cleared

What challenge do enterprise and small businesses have in common They do not have the resources to provide excellent customer service Limited capabilities can make reaching customers challenging They tend to compete for the same customers They are not security savvy

They tend to compete for the same customers

True or False? A host-based application architecture represents a single point of failure.

True

True or False? A hybrid network topology is a network that contains several different topologies

True

True or False? A protocol stack is how software operates at different layers of the OSI model

True

True or False? A unified communications (UC) system can deny unauthorized contacts and redirect authorized contacts to authorized individuals.

True

True or False? ARPANET was the basis for today's Internet

True

True or False? An instance of a service listening for traffic on a specific port is called a socket.

True

True or False? Because small business have only a fraction of the customers of large organizations, the consequences of losing customers are more visible in small businesses

True

True or False? Because small businesses have only a fraction of the customers of large organizations, the consequences of losing customers are more visible in small businesses.

True

True or False? Building Industry Consulting Service International (BICSI) is a source for structured wiring standards.

True

True or False? Building Industry Consulting Service International (BICSI) is a source for structured wiring stands

True

True or False? Campus backbone networks are aggregations of multiple buildings on the same physical campus

True

True or False? Departmental local area networks are needed when workgroup connections are physically located in different wiring closets

True

True or False? Hyperconnectivity refers to always being online and connected.

True

True or False? IPv4 addresses are written as four separate 8-bit numbers separated by periods or dots.

True

True or False? Internet of Things (IoT) autonomy can move some administrative decisions into programs that do not need human interaction

True

True or False? One of the two primary Transport layer protocols, UDP is generally used when the application has both high packet-loss tolerance and speed requirements, such as with gaming or video streaming services.

True

True or False? Security is one reason and internetwork local area networks

True

True or False? Segmenting a network into multiple collision domains makes a network more efficient.

True

True or False? The OSI Network Layer provides network addressing for packets.

True

True or False? The Presentation Layer of the OSI model converts data into standard formats, such as American Standard Code for Information Interchange (ASCII), for application program use.

True

True or False? The Session Layer (OSI Layer 5) is the first layer that connects packets together into conversations

True

True or False? The primary difference between Ethernet II and the IEEE 802.3 Ethernet standards is the frame layout.

True

True or false? A challenge for organizations that are geographically spread out is effective communications throughout the organization

True

True or false? A virtual machine operate just like a physical computer

True

True or false? For some devices and software, multiple OSI model layers are combined and, in some cases, layers may be omitted

True

True or false? Frequent traveler cards with radio frequency identification (RFID) technology enable travelers to use the same card as the hotel room key.

True

True or false? Requests for proposals (RFPs) and subsequent contracts with government agencies often limit communication to specific parties in order to avoid undocumented information exchange.

True

True or false? Where as intranet is a private network within an organization's infrastructure, an extranet is remotely accessible network typically for business partners and suppliers.

True

All of the following are true of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), except UDP provides best effort with no guarantee of delivery UDP's primary service is packet routing. TCP provides a reliable end-to-end communication channel for IP packets TCP guarantees the delivery of each IP packet via a TCP

UDP's primary service is packet routing.

Which of the following is an example of an IP-based communication is Plain old telephone service (POTS) Voice over Internet Protocol (VoIP) Circuit-Switched Data (CSD) and High-Speed Circuit-Switched Data (HCSD) cellular networks Integrated Services Digital Network (ISDN) B-channel

Voice over Internet Protocol (VoIP)

Which of the following correctly identifies a protocol or application and a common device associated with the Data Link Layer of the OSI model? TLS, firewall Wi-Fi (IEEE 802.11), network card ICMP, Layer 3 Switch Ethernet, fiber (cable)

WIFI (IEEE 802.11), network card

All of the following are true of connection-orientated and connectionless protocols, except: a network cannot support both connectionless and connection-oriented protocols a connectionless protocol treats each message separately Internet Protocol is called a connectionless protocol A connection-oriented protocol is set up a connection between the source and destination, and all messages the two hosts exchange during the conversation use the same connection information

a network cannot support both connectionless and connection-oriented protocols.

On a circuit-switched network many conversations share the same network and use more of the network's capacity collisions and congestion are not issues transmission delay or latency can be high communications are inexpensive

collisions and congestion are not issues

Using multiple modes of business communications gives enterprise businesses the unique ability to Manage fewer employees develop a blended solution custom-fit for an enterprise identify specific business challenges. communicate across time zones

develop a blended solution custom-fit for an enterprise

Internet Protocol version 6 (IPv6) accomplishes all of the following except enables two or more devices that connect to the Internet to use the same IP address. improves IP network efficiency reduces Internet bandwidth use expands the number of available IP addresses

enables two or more devices that connect to the Internet to use the same IP address.

The Presentation Layer of the OSI model: on the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network. is the software entry point for sending messages to and from an application's users. sets up, manages, and terminates connections between applications on source and destination computers. serves as the primary interface for application software to interact with networks

on the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network.

What type of file does Wireshark use to store captured packets? pcap wcap fcaps cap

pcap

Ethernet networks todays are _______ to build and maintain more difficult and more expensive more difficult but less expensive simpler and less expensive simpler but more expensive

simpler and less expensive

Internet Protocol (IP) supports the concept of grouping packets together relies solely on the network address to determine each packet's next logical step as it travels to its destination provides packet routing and host identification to deliver packets to their destination is the primary protocol that relays packest across most of today's diverse networks

supports the concept of grouping packets together


संबंधित स्टडी सेट्स

Pearson Vol 3 Chapter 12: Perfusion

View Set

Chapter 8 Anatomy and Physiology

View Set

Location Strategy: Use Location to Build Competitive Advantage

View Set

Chapter 9: Drug Therapy for Coagulation Disorders

View Set

parkland bio 122 quiz 8- metabolism

View Set