Net Plus Review Questions
Wide Area Network (WAN)
A ____is a network that spans more than one geographic location, often connecting separated LANs.
topology
A network's physical and logical layout.
LDAP (Lightweight Directory Access Protocol) Port 389
A protocol that provides a mechanism to access and query directory services systems and it's port number.
ad hoc topology
Also called an unmanaged wireless topology.
C. To create the complete ring, the ring-in (RI) port on each MSAU is connected to the ring-out (RO) port on another MSAU. The last MSAU in the ring is then connected to the first to complete the ring.
As a network administrator, you are called in to troubleshoot a problem on a token ring network. The network uses two MSAUs connected using the ring-in ports on both devices. All network cards are set at the same speed. What is the likely cause of the problem? A. Bad network card B. Faulty cabling C. MSAU configuration D. Network card configuration
FTP and TFTP map to the application layer of the OSI model.
At what layer of the OSI model do FTP and TFTP map?
C. Data link
At which OSI layer does an AP operate? A. Network B. Physical C. Data link D. Session
Layer 6 (Presentation)
At which layer of the OSI model does TLS operate?
B, C. A switch uses the MAC addresses of connected devices to make its forwarding decisions. Therefore, it is called a data link, or Layer 2, network device. It can also operate at Layer 3 or be a multilayer switch. Devices or components that operate at Layer 1 typically are media based, such as cables or connectors. Layer 4 components typically are software based, not hardware based.
At which two OSI layers can a switch operate? (Choose two.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
A. DHCP uses port 68 by default (along with 67). DNS uses port 53, SMB uses 445, and SMTP uses port 25.
By default, which protocol uses port 68? A. DHCP B. DNS C. SMB D. SMTP
ad hoc topology
Devices communicate directly among themselves without using an access point.
D. DNS is a system that resolves hostnames to IP addresses. The term FQDN is used to describe the entire hostname. None of the other services use FQDNs.
During a discussion with your ISP's technical support representative, he mentions that you might have been using the wrong FQDN. Which TCP/IPbased network service is he referring to? A. DHCP B. WINS C. SNMP D. DNS
Layer 6 (Presentation)
Encryption is an important function of which layer of the OSI model?
Layer 2
HDLC, L2TP, PPP, PPTP, STP, and VLANs all operate on which layer on the OSI model?
Error checking Service addressing Segmentation
How does Layer 4 transport data between network devices?
79
How many channels are available for Bluetooth?
multistation access unit (MSAU)
In a token ring network, a ____ is equivalent to a hub or switch on an Ethernet network.
A storage-area network (SAN) makes block-level data storage available to devices on the network.
In what networking type is consolidated, block-level data storage made available to networked devices?
C. Reservations are specific addresses reserved for clients.
One of the programmers has asked that DHCP always issue his workstation the same IP address. What feature of DHCP enables you to accomplish this? A. Stipulation B. Rider C. Reservation D. Provision
physical
Protocols and technologies such as USB, Ethernet, DSL, ISDN, T-carrier links (T1 and T3), GSM, and SONET operate at the ____ layer.
Layer 3
Protocols in this layer are responsible for route selection.
Layer 5
Protocols such as NetBIOS, NFS, and SMB operate at which layer of the OSI model?
Application Layer
SMTP, SMB, FTP, HTTP, HTTPS, IMAP, POP3 all operate at which layer of the OSI model?
Application Layer
SSH, BGP, DHCP, DNS, NTP, RTP, SIP operate at which layer of the OSI model?
A. TCP is an example of a connection-oriented transport protocol. UDP is an example of a connectionless protocol. Connection reliant and connection dependent are not terms commonly associated with protocols.
TCP is an example of what kind of transport protocol? A. Connection oriented B. Connection reliant C. Connection dependent D. Connectionless
SSH is a more secure alternative to Telnet.
The SSH protocol is a more secure alternative to what protocol?
Session
The ____ layer is responsible for managing and controlling the synchronization of data between applications on two devices.
presentation
The ____ layer's basic function is to convert the data intended for or received from the application layer into another format.
Transport Layer
The basic function of this layer of the OSI model is to provide mechanism to move data between network devices.
application
The function of the ____ layer is to take requests and data from the users and pass them to the lower layers of the OSI model.
Network Layer
The primary responsibility of this layer is routing.
Buffering Windowing Layer 4
The two common methods of data flow control are what and at which layer are these methods employed?
logical network topology
The way in which the network appears to the devices that use it.
ICMP (Internet Control Message Protocol)
This protocol works with the IP layer to provide error checking and reporting functionality.
Frequency Hopping Spread Spectrum (FHSS)
This spectrum type requires the use of narrowband signals that change frequencies in a predictable pattern.
Segmentation
To traverse the network, blocks of data need to be broken into packets of a manageable size for the lower layers to handle. What is this process called?
True
True or False Ad hoc topologies do not use APs.
True. A WAN is a network that spans more than one geographic location,often connecting separated LANs.
True or false: The biggest difference between a LAN and a WAN is usually the size of the network.
True. Transport protocols map to the transport layer of the OSI model and are responsible for transporting data across the network. UDP is a transport protocol.
True or false: Transport protocols, such as UDP, map to the transport layer of the OSI model and are responsible for transporting data across the network.
The *mput* command uploads multiple files to the remote host in FTP.
What FTP command uploads multiple files to the remote host?
B. SNMP uses databases of information called MIBs to define what parameters are accessible, which of the parameters are read-only, and which can be set.
What are SNMP databases called? A. HOSTS B. MIBs C. WINS D. Agents
A. SNMP communities are logical groupings of systems. When a system is configured as part of a community, it communicates only with other devices that have the same community name.
What are logical groupings of SNMP systems known as? A. Communities B. Pairs C. Mirrors D. Nodes
JPEG TIFF GIF ASCII MPEG MP3 MIDI
What are some examples of data formats that you would find on the Presentation Layer?
RIP OSPF IP ARP RARP ATM IS-IS IPsec ICMP MPLS
What are some of the protocols that you might find on the Network Layer of the OSI model?
Application Layer Transport Layer Internet Layer Network Interface Layer
What are the layers of the TCP/IP Model?
Media Access Control (MAC) Logical Link Control (LLC)
What are the two sublayers that make up the Data Link Layer?
A, D. SNMPv3 supports authentication and encryption.
What are two features supported in SNMPv3 and not previous versions? A. Authentication B. Dynamic mapping C. Platform independence D. Encryption
Carrier Sense Multiple Access / Collision Avoidance
What does CSMA/CA stand for?
Dynamic DNS is a newer system that enables hosts to be dynamically registered with the DNS server.
What is dynamic DNS?
All the 802.11 wireless standards employ the CSMA/CA access method.
What is the access method employed by the 802.11 wireless standards?
1 MHz
What is the bandwidth of each Bluetooth channel?
C. ARP resolves IP addresses to MAC addresses. Answer A describes the function of RARP, answer B describes an unrelated process, and answer D describes the process of DNS resolution.
What is the function of ARP? A. It resolves MAC addresses to IP addresses. B. It resolves NetBIOS names to IP addresses. C. It resolves IP addresses to MAC addresses. D. It resolves hostnames to IP addresses.
D. NTP is used to communicate time-synchronization information between devices. Network File System (NFS) is a protocol typically associated with accessing shared folders on a Linux system. Utilization information is communicated to a central management system most commonly by using SNMP.
What is the function of NTP? A. It provides a mechanism for the sharing of authentication information. B. It is used to access shared folders on a Linux system. C. It is used to communicate utilization information to a central manager. D. It is used to communicate time synchronization information between systems.
When a system configured to use DHCP comes onto the network, it broadcasts a special packet that looks for a DHCP server. This packet is known as the DHCPDISCOVER packet.
What is the name of the packet on a system configured to use DHCP broadcasts when it comes onto the network?
Within DHCP, ranges of IP addresses are known as scopes.
What is the name used for ranges of IP addresses available within DHCP?
SFTP, based on SSH
What is the secure version of FTP called and what technology is it based on?
1 or 2 Mbps
What is the speed of the 802.11 standard?
Up to 54 Mps
What is the speed of the 802.11a standard?
Up to 1.3 Gbps
What is the speed of the 802.11ac standard?
Up to 11 Mbps
What is the speed of the 802.11b standard?
Up to 54 Mbps
What is the speed of the 802.11g standard?
Up to 600 Mbps
What is the speed of the 802.11n standard?
DSSS and FHSS
What is the spread spectrum of the 802.11 standard?
OFDM
What is the spread spectrum of the 802.11a standard?
OFDM
What is the spread spectrum of the 802.11ac standard?
DSSS
What is the spread spectrum of the 802.11b standard?
DSSS
What is the spread spectrum of the 802.11g standard?
OFDM
What is the spread spectrum of the 802.11n standard?
A personal-area network (PAN) is essentially a LAN created to share data among devices associated with you.
What network type is essentially a LAN created to share data among devices associated with you?
HTTPS uses port 443, RDP uses port 3389, and DHCP uses ports 67 and 68.
What ports do the HTTPS, RDP, and DHCP protocols use?
Multiple input, multiple output (MIMO) and multiuser MIMO (MU-MIMO) antenna technologies are the biggest developments for802.11n/802.11ac and the key to the new speeds.
What technologies are considered the biggest developments for 802.11n/802.11ac and the keys to the newer speeds?
B. A WAN can be referred to as a metropolitan-area network (MAN) when it is confined to a certain geographic area, such as a city.
When a WAN is confined to a certain geographic area, such as a city, it is known as a: A. LAN B. MAN C. VAN D. VPN
B. The AAAA record is most commonly used to map hostnames to an IP address for a host with IPv6. The A record is not used for this purpose. MX identifies the mail exchanger, and PTR is used for reverse lookup.
Which DNS record is most commonly used to map hostnames to an IP address for a host with IPv6? A. A B. AAAA C. MX D. PTR
C. The CNAME record stores additional hostnames, or aliases, for hosts in the domain. There is not an ALSO record or ALIAS, and PTR is used for reverse lookups.
Which DNS record stores additional hostnames, or aliases, for hosts in the domain? A. ALSO B. ALIAS C. CNAME D. PTR
The presentation layer converts data from the application layer into a format that can be sent over the network. It also converts data from the session layer into a format the application layer can understand.
Which layer of the OSI model converts data from the application layer into a format that can be sent over the network?
Layer 3
Which layer of the OSI model provides mechanism by which data can be passed from one network system to another?
IMAP4. POP3 transmits the password used to access a mailbox in clear text.
Which mail protocol is more secure; POP3 or IMAP4?
POP3 and IMAP4
Which mail protocol(s) are primarily used to receive mail?
B. The wired mesh topology requires each computer on the network to be individually connected to every other device. This configuration provides maximum reliability and redundancy for the network. However, it is very costly to implement because of the multiple wiring requirements
Which network topology offers the greatest level of redundancy but has the highest implementation cost? A. Wireless mesh B. Wired mesh C. Hybrid star D. Bus network
B. The transport layer is responsible for establishing a connection between networked devices. The network layer is most commonly associated with route discovery and datagram delivery. Protocols at the session layer synchronize the data exchange between applications on separate devices. Protocols at the data link layer perform error detection and handling for the transmitted signals and define the method by which the medium is accessed.
Which of the following OSI layers is responsible for establishing connections between two devices? A. Network B. Transport C. Session D. Data link
A, C. Both TCP and UDP are transport protocols. IP is a network protocol, and THC is not a valid protocol.
Which of the following are considered transport protocols? (Choose the two best answers.) A. TCP B. IP C. UDP D. THC
A, D. The data link layer is broken into two distinct sublayers: Media Access Control (MAC) and Logical Link Control (LLC). LCL is not a valid term. Session is another of the OSI model layers.
Which of the following are sublayers of the data link layer? (Choose two.) A. MAC B. LCL C. Session D. LLC
D. A campus-area network (CAN) is a computer network in a defined area that links buildings and consists of multiple LANs within that limited geographical area.
Which of the following is a computer network in a defined area that links buildings and consists of multiple LANs within that limited geographical area? A. SAN B. PAN C. DAN D. CAN
B. DHCPPROVE is not a common packet. The other choices presented (DHCPACK, DHCPDISCOVER, and DHCPOFFER) are part of the normal process.
Which of the following is not a common packet sent during the normal DHCP process? A. DHCPACK B. DHCPPROVE C. DHCPDISCOVER D. DHCPOFFER
B. The default port for H.323 is 1720. HTTPS uses port 443 by default, whereas LDAPS uses 636, and RDP uses port 3389.
Which of the following ports are associated with H.323? A. 443 B. 1720 C. 636 D. 3389
D. TCP is a connection-oriented protocol that guarantees delivery of data. FTP is a protocol used to transfer large blocks of data. POP stands for Post Office Protocol and is not the correct choice. IP is a network layer protocol responsible for tasks such as addressing and route discovery.
Which of the following protocols offers guaranteed delivery? A. FTP B. POP C. IP D. TCP
C. A wireless LAN (WLAN) augments an Ethernet LAN or, in some cases,replaces it altogether.
Which of the following provides a flexible and secure data communications system that augments an Ethernet LAN or, in some cases, replaces it altogether? A. PHLAN B. MAN C. WLAN D. CRAN
A, C. In a bus network, a single break in the network cable can disrupt all the devices on that segment of the network, a significant shortcoming. A bus network also uses a single cable as a backbone to which all networking devices attach. A star network requires networked devices to connect to a centralized device such as a hub, switch, or MSAU. Therefore, answer B is incorrect. Answer D is also incorrect because it uses a dual-ring configuration.
Which of the following statements are associated with a bus LAN network?(Choose all correct answers.) A. A single cable break can cause complete network disruption. B. All devices connect to a central device. C. It uses a single backbone to connect all network devices. D. It uses a dual-ring configuration.
D. On a star network, each network device uses a separate cable to make a point-to-point connection to a centralized device, such as a hub or a switch.With such a configuration, a new device can be added to the network by attaching the new device to the hub or switch with its own cable. This process does not disrupt the users who are currently on the network.Answers A and B are incorrect because the addition of new network devices on a ring or bus network can cause a disruption in the network and cause network services to be unavailable during the installation of a new device.
Which of the following topologies allows for network expansion with the least amount of disruption for the current network users? A. Bus B. Ring C. LAN D. Star
22
Which port does SFTP use?
SMTP
Which protocol defines how mail messages are sent between hosts?
Of the choices given, only a star topology would utilize a switch.
Which topology (star, bus, or ring) would utilize a switch?
802.11 802.11b 802.11g 802.11n
Which wireless standards operate in the 2.4GHz medium?
802.11a 802.11n 802.11ac
Which wireless standards operate in the 5GHz frequency?
This is known as a three-way handshake.
With TCP, a data session is established through a three-step process. This is known as a three-way _____.
With a mesh topology, every node has a direct connection to every other node.
With which topology does every node have a direct connection to every other node?
The domain name, along with any subdomains, is called the fully qualified domain name (FQDN) because it includes all the components from the top of the DNS namespace to the host.
Within DNS, what is the domain name, along with any subdomains, called?
D. MU-MIMO is used by the 802.11ac standard and makes multiuser MIMO possible (increasing the range and speed of wireless networking). MIMO itself enables the transmission of multiple data streams traveling on different antennas in the same channel at the same time.
You are installing a wireless network solution that uses a feature known as MU-MIMO. Which wireless networking standard are you using? A. 802.11a B. 802.11b C. 802.11n D. 802.11ac
D. The IEEE standard 802.11n can use either the 2.4 GHz or 5 GHz radio frequencies. 802.11a uses 5 GHz, and 802.11b and 802.11g use 2.4 GHz. 802.11ac operates at 5 GHz.
You are installing a wireless network solution, and you require a standard that can operate using either 2.4 GHz or 5 GHz frequencies. Which of the following standards would you choose? A. 802.11a B. 802.11b C. 802.11g D. 802.11n E. 802.11ac
C. A mesh network uses a point-to-point connection to every device on the network. This creates multiple points for the data to be transmitted around the network and therefore creates a high degree of redundancy. The star,ring, and bus topologies do not offer the greatest amount of fault tolerance.
You have been asked to install a network that will give the network users the greatest amount of fault tolerance. Which of the following network topologies would you choose? A. Star B. Ring C. Mesh D. Bus