Review Questions Chapter 1
16. What is the fundamental distinction between a Layer 2 switch and a router? A Layer 2 switch belongs only to its local network, and a router belongs to two or more
A Layer 2 switch belongs only to its local network, and a router belongs to two or more
5.Which email protocol allows an email client to read mail stored on the mail server? A. IMAP4 B. SMTP C. TCP D. POP3
A. IMAP4
1.In the client-server model, what is the primary protocol used for communication between a browser and Web server? A. FTP B. TCP C. HTTP D. SSL
C. HTTP
10.Which Session layer protocol is a streaming live video teleconference likely to use on the network? A. UDP B. SMTP C. RTP D. TCP
C. RTP
11.A network consists of 10 computers, all running Windows 7 Professional. One computer acts as a file server and serves up data to other computers on the network. Which networking model does the network use?
Peer-to-peer model
19. What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work? Segment, Datagram and Transport layer
Segment, Datagram and Transport layer
14.A network consists of seven computers and a network printer all connected directly to one switch. Which network topology does this network use?
Star topology
18. What is the fundamental distinction between a MAN and a WAN? A MAN covers a small geographical area, and a WAN covers a large geographical area.
A MAN covers a small geographical area, and a WAN covers a large geographical area.
17. What is the fundamental distinction between a node and a host? A host is a computer that hosts a resource on the network, and a node is any computer or device that can be addressed on the network.
A host is a computer that hosts a resource on the network, and a node is any computer or device that can be addressed on the network.
8.What service provided by Windows Server 2012 R2 allows a computer to serve up applications to other computers on the network? A. Remote Desktop Services B. Windows 8.1 C. File Transfer Protocol D. Active Directory
A. Remote Desktop Services
6.Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A. Telnet B. Remote Desktop C. FTP D. SSH
A. Telnet
3.Apache is a popular example of what type of networking software? A. Web server B. Browser C. Email server D. Email client
A. Web server
13.What is the name of the domain controller database that Windows Server 2012 R2 uses to store data about user access and resources on the network?
Active Directory
7.Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? A. Telnet B. Remote Desktop C. FTP D. SSH
B. Remote Desktop
2.Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications? A. HTTP and HTTPS B. SSL and TLS C. SSL and HTTP D. TCP and UDP
B. SSL and TLS
12.In Question 11, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support that it could not support without the upgrade?
Client-server model
9.List three types of services a network might support that are considered part of unified communications or convergence. A. File transfers, print services, and conversational voice B. User authentication, streaming live audio and video, and print services C. Web services, email services, and file services D. Conversational voice, streaming live audio and voice, and streaming stored audio and voice
D. Conversational voice, streaming live audio and voice, and streaming stored audio and voice
4.Which email protocol allows an email client to download email messages to the local computer? A. IMAP4 B. SMTP C. TCP D. POP3
D. POP3
20. Which type of address is used at the Transport layer to identify the receiving application?
Port number
15. In Question 14, suppose a new switch is connected to the first switch by way of a network cable and three computers are connected to the new switch. Which network topology is now used?
Star-bus topology
21. Is TCP or UDP normally used when streaming live video? Why? UDP, because guaranteed delivery is not as important as fast transmissions.
UDP, because guaranteed delivery is not as important as fast transmissions.