CH. 01: Introduction to Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

8. The Transport layer header addresses a receiving application by a number called a MAC address. a. True b. False

False POINTS: 1 DIFFICULTY: Difficult REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

49. What are some general OSHA guidelines to use when using power (electric) tools or other hand tools in the workplace?

Some general OSHA guidelines for using power tools or other hand tools in the workplace are as follows: *Wear personal protective equipment (PPE) to protect yourself as you work. For example, wear eye protection where dust or fumes are generated by power tools. *Keep all tools in good condition and properly store tools not in use. Examine a tool for damage before you use it. *Use the right tool for the job and operate the tool according to the manufacturer's instructions and guidelines. Don't work with a tool unless you are trained and authorized to use it. *Watch out for trip hazards, so you and others don't stumble on a tool or cord. For example, keep power tool electrical extension cords out from underfoot, and don't leave hand tools lying around unattended. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

42. What are some of the typical elements that might be present in a fire suppression system, and what do they do?

A fire suppression system in a data center typically includes the following: * emergency alert system-These systems vary, but they typically generate loud noise and flashing lights. Some send text and voice message alerts to key personnel, and post alerts by email, network messages, and other means. * portable fire extinguishers-Note that electrical fires require a Class C fire extinguisher. * emergency power-off switch-Don't use a power-off switch unless you really need to; improper shutdowns are hard on computers and their data. * suppression agent-This can consist of a foaming chemical, gas, or water that sprays everywhere to put out the fire. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Safety Procedures and Policies QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

43. What is the difference between a WAN, MAN, CAN, and a PAN?

A group of LANs that spread over a wide geographical area is called a WAN (wide area network). A group of connected LANs in the same geographical area-for example, a handful of government offices surrounding a state capitol building-is known as a MAN (metropolitan area network) or CAN (campus area network). The smallest network is a PAN (personal area network), which is a network of personal devices, such as the network you use when you sync your smartphone and your computer. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Hardware QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

44. What are some of the tasks for which a network operating system is responsible?

A network operating system is typically responsible for the following: * Managing data and other resources for a number of clients * Ensuring that only authorized users access the network * Controlling which types of files a user can open and read * Restricting when and from where users can access the network * Dictating which rules computers will use to communicate * In some situations, supplying applications and data files to clients POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Models QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.1 - Distinguish between client-server and peer-to-peer networks DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

45. What is a remote application, and how can remote applications be implemented on Windows Server?

A remote application is an application that is installed and executed on a server and is presented to a user working at a client computer. Windows Server 2008 and later versions include Remote Desktop Services to manage remote applications, and versions of Windows Server prior to 2008 provided Terminal Services. Both use RDP (Remote Desktop Protocol) to present the remote application and its data to the client. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Client-Server Applications QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.1 - Distinguish between client-server and peer-to-peer networks DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

50. Explain the two different categories of Application layer protocols, and then detail the PDU used at this layer.

Application layer protocols are used by programs that fall into two categories: *Application programs that provide services to a user, such as a browser and Web server using the HTTP Application layer protocol *Utility programs that provide services to the system, such as SNMP (Simple Network Management Protocol) programs that monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention. Data that is passed between applications or utility programs and the operating system is called a payload and includes control information. The two end-system computers that initiate sending and receiving data are called hosts. POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

48. How can you prevent damage to a component prior to touching it?

Before touching a component, first ground yourself using one of these methods: *Wear an ESD strap around your wrist that clips onto the chassis or computer case, which eliminates any ESD between you and the chassis and its components. *If you don't have an ESD strap handy, be sure to at least touch the case before you touch any component inside the case. This is not as effective as wearing an ESD strap, but can reduce the risk of ESD. *To protect a sensitive component, always store it inside an antistatic bag when it's not in use. In addition to protecting against ESD, always shut down and unplug a computer before working inside it. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

1. Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Models QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.1 - Distinguish between client-server and peer-to-peer networks DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

4. Static electricity is an electrical charge in motion. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety Procedures and Policies QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

5. The protocol data unit for the Physical layer of the OSI model is payload, or data. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

7. The Data Link layer attaches a trailer to the end of a packet, and does not include a header. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

9. The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

47. Describe how the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) differ from each other, and provide examples of where each might be used.

The Transmission Control Protocol (TCP) makes a connection with the end host, checks whether the data is received, and resends it if it is not. TCP is, therefore, called a connection-oriented protocol. TCP is used by applications such as Web browsers and email. Guaranteed delivery takes longer and is used when it is important to know that the data reached its destination. The User Datagram Protocol (UDP) does not guarantee delivery by first connecting and checking whether data is received; thus, UDP is called a connectionless protocol or best-effort protocol. UDP is used for broadcasting, such as streaming video or audio over the Web, where guaranteed delivery is not as important as fast transmission. UDP is also used to monitor network traffic. POINTS: 1 DIFFICULTY: Difficult REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

46. Explain the differences between a physical topology and a logical topology.

The term physical topology, or network topology, mostly applies to hardware and describes how computers, other devices, and cables fit together to form the physical network. The term logical topology has to do with software and describes how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources, such as applications and databases, are shared on the network. POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Models QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

6. The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

3. After a problem and its symptoms have been identified, a theory regarding a probable cause should be established. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Network Problems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.6 - Describe the seven-step troubleshooting model for solving a networking problem DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

2. The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. a. True b. False

True POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Hardware QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 1:06 PM

10. In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS. a. True b. False

True POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

41. What are the differences between the POP3 and IMAP4 protocols?

Using the POP3 (Post Office Protocol, version 3), email is downloaded to the client computer. When using IMAP4 however, the client application manages the email while it's stored on the server. POINTS: 1 DIFFICULTY: Easy REFERENCES: Client-Server Applications QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

18. A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? a. fail-open b. fail-close c. fail-tolerant d. fail-oriented

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

20. At what layer of the OSI model does a network switch normally operate? a. Layer 2 b. Layer 3 c. Layer 4 d. Layer 5

a POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

28. The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? a. MAC (Media Access Control) address b. DAC (Data Access Control) address c. DAC (Digital Access Control) address d. PAC (Packet Access Control) address

a POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

30. What federal agency is charged with safety and health in the workplace? a. Occupational Safety and Health Administration (OSHA) b. Workplace Safety and Hazard Administration (WSHA) c. Office Safety and Standards Department (OSSD) d. Hazardous Materials and Safety Management (HMSM)

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

24. Which of the following is an example of encapsulation? a. The addition of a header to data inherited from the layer above in the OSI model. b. The subtraction of a header from data inherited from the layer below in the OSI model. c. The modification of headers from a higher layer in the OSI model. d. The addition of a trailer to data inherited from the layer above in the OSI model.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

33. In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Application b. Internet c. Transport d. Link

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

19. An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a. fail-open b. fail-close c. fail-tolerant d. fail-dynamic

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

23. In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? a. The Presentation layer describes the interface between two applications, each on separate computers. b. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. c. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application. d. The Presentation layer is responsible for transporting Application layer payloads from one application to another.

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

16. If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a. bus topology b. star topology c. star bus topology d. mesh topology

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Hardware QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

35. In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire? a. fire extinction agent b. fire suppression agent c. extinguishing medium d. eliminating factor

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

37. What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node? a. MAC address b. IP address c. port address d. autonomous system address

b POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

40. In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? a. Active Directory Federated Users (AD FU) b. Active Directory Domain Services (AD DS) c. Automated Directory Network Services (AD NS) d. Windows Named Resource Services (WN RS)

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Models QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

31. What is the minimal amount of voltage required to damage an electrical component? a. 5 volts b. 10 volts c. 100 volts d. 1500 volts

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

25. What mail protocol is used to send mail messages to a server? a. POP3 b. IMAP4 c. SMTP d. HTTPS

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Client-Server Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

15. What is a defining characteristic of a bus topology based network? a. Devices are connected to two adjacent devices, and communication priority is granted by a token. b. Devices are connected directly to a centralized networking device, known as a network switch. c. Devices are daisy-chained together in a single line. d. Devices are directly attached to a network router, which forwards data to intended destinations.

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Hardware QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

36. In the United States, who is able to activate the Emergency Alert System at the national level? a. Any U.S. state or territory b. The Federal Bureau of Investigation c. The President d. Local law enforcement

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

38. What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? a. HTTP b. POP3 c. SNMP d. SMTP

c POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

32. When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? a. catastrophic failure b. interrupting failure c. upset failure d. temporary failure

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

12. What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? a. Application Layer b. Presentation Layer c. Session Layer d. Transport Layer

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

14. What statement accurately reflects what occurs when a message is too large to transport on a network? a. The message is discarded and must be sent again. b. The message is sent anyway, and is received by the destination as garbage data. c. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). d. An ICMP error is generated, and the application must reformat the data for transmission.

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

27. The TCP and UDP protocols both exist at what layer of the OSI model? a. Application b. Presentation c. Transport d. Network

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

29. In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Application b. Network c. Physical d. Data Link

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

34. What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? a. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination. b. The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. c. The packet will be dropped silently, requiring the communicating application try again. d. The packet will be divided into smaller packets using fragmentation.

d POINTS: 1 DIFFICULTY: Difficult REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

39. The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? a. File Transfer Protocol (FTP) b. Secure Sockets Layer (SSL) c. Secure Shell (SSH) d. Remote Desktop Protocol (RDP)

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Client-Server Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

11. HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? a. Layer 4 b. Layer 5 c. Layer 6 d. Layer 7

d POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

13. The Data Link Layer utilizes what name for its protocol data unit (PDU)? a. packet b. data c. bit d. frame

d POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

22. At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Application b. Session c. Transport d. Network

d POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

26. What is the most popular web server application? a. Microsoft Internet Information Services b. NGINX c. Lighttpd d. Apache

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Client-Server Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

21. Which of the following is not one of the disadvantages of peer-to-peer networks? a. They lack scalability. b. They are not necessarily secure. c. They are impractical for connecting large numbers of computers. d. They centralize user account logins.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Models QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.1 - Distinguish between client-server and peer-to-peer networks DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

17. The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? a. Toxic Chemical Safety Procedure (TCSP) b. Dangerous and Hazardous Waste Disposal Sheet (DHWDS) c. Environmental Chemical Hazard Sheet (ECHS) d. Material Safety Data Sheet (MSDS)

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM


Set pelajaran terkait

GEO 103 (Dr. J.) - Test #7 Study Guide

View Set

Master Algebra 2 (except 11.4 and half of chp. 7)

View Set

CH 13 Financial Statements and Closing Procedures

View Set

Chapter 15-Monitoring & Auditing AIS

View Set

A2: Types of Private Insurers Quiz

View Set