ucertify quiz ch. 2
how big is a TCP packet header? a. the size is always 20 bytes b. the size depends on the protocol being used c. the size is always 40 bytes d. the size depends on the data being sent
a. 20 bytes
you are examining a list of IP addresses. some are internal, some are external, and some are not valid. which of the following is NOT a valid IP address? a. 295.253.254.01 b. 131.156.5.2 c. 245.200.11.1 d. 127.0.0.1
a. 295.253.254.01
you are assigned with attaching connectors to segments of a cable. what type of connector is used with network cables? a. RJ-45 b. RJ-12 c. RJ-85 d. RJ-11
a. RJ-45
john is trying to simply connect three computers in a small network. he does not need any sort of routing capability and is not concerned about network traffic. what is the simplest device for connecting computers? a. hub b. interface c. NIC d. router
a. hub
sharice is trying to teach a new tech basic networking terms. what should she tell this new tech NIC stands for? a. network interface card b. network interaction connector c. network interface connector d. network interaction card
a. network interface card
you are explaining the history of networking to a group of first-year students. what did Time Berners-Lee invent? a. world wide web b. email c. tcp d. first computer virus
a. world wide web
internet addresses of the form www.chuckeasttom.com are called what? a. user-friendly web addresses b. uniform resource locators c. user-accessible web addresses d. uniform address identifiers
b. uniform resource locators
what type of cable is used in most networks? a. shielded untwisted-pair b. unshielded twisted-pair c. shielded twisted-pair d. unshielded untwisted-pair
b. unshielded twisted-pair
which of the following is a unique hexadecimal number that identifies your network card? a. MAC id b. NIC id c. MAC address d. NIC address
c. MAC address
Gunther is setting up encrypted remote communications so that the server admins can remotely access servers. What protocol is used for remotely logging on to a computer in a secure manner? a. telnet b. http c. ssh d. smtp
c. SSH
you are explaining the history of networking to a group of first-year students. what did Vince Cerf invent? a. world wide web b. email c. TCP d. first computer virus
c. TCP
malek is purchasing cable to use in setting up small office networks. he wants to stock up on commonly used cable. what type of cable do most networks use? a. STP b. phone cable c. UTP d. net cable
c. UTP
which us govt agency created the distributed network that formed the basis for the internet? a. nasa b. department of energy c. advanced research projects agency d. cia
c. advanced research projects agency
which class of addresses is the IP address 193.44.34.12? a. class A b. class B c. class C d. class D
c. class C
which layer of the OSI model is divided into two sublayers? a. presentation b. network c. data link d. session
c. data link
which of the following is a device used to connect two or more networks? a. NIC b. hub c. router d. switch
c. router
sheryl is explaining the OSI model to new techs at her company. she is trying to explain what protocols operate at various layers of the OSI model. at what layer of the OSI model does TCP operate? a. application b. transport c. data link d. network
c. transport
juan has just installed a new T1 line in a medical office. the front desk receptionist has asked what speed they can expect. a T1 line sends data at what speed? a. 100 mbps b. 56.6 kbps c. 155 mbps d. 1.54 mbps
d. 1.54 mbps
what protocol translates web addresses into IP addresses? a. SMTP b. DHCP c. TFTP d. DNS
d. DNS
mohammed needs to open a firewall port so that web traffic can be passed through the firewall. what protocol is used for web pages, and on which port does it work? a. DHCP, port 80 b. DHCP, port 21 c. HTTP, port 21 d. HTTP, port 80
d. HTTP, port 80
john is working with command-line utilities to gather diagnostic information about a computer that cannot connect to the network. which utility provides information about a machine's network configuration? a. ping b. MyConfig c. Tracert d. IPConfig
d. IPConfig
what protocol is used to send an email, and on what port does it work? a. POP3, port 110 b. SMTP, port 110 c. POP3, port 25 d. SMTP, port 25
d. SMTP port 25
what is the name for the point where backbones of the internet connect? a. switches b. connectors c. routers d. network access points
d. network access points
the IP address 127.0.0.1 always refers to your what? a. nearest NAP b. nearest router c. ISP d. self
d. self
which of the following was one of the universities involved in the original distributed network set up by a govt agency? a. princeton b. mit c. harvard d. uc berkeley
d. uc berkeley