Info and Network Security Chapter 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You are examining a list of IP addresses. Some are internal, someexternal, and some are not valid. Which of the following is not a validIP address? 127.0.0.1 131.156.5.2 295.253.254.1 245.200.11.1

295.253.254.1

Unshielded twisted-pair cable capable with a specification of 100MHz/100 Mbps is also called Category ________. 5 6 7 2

5

If an IP address has the number 194 in the first octet, it is a class_______ address. C B D A

C

What class of address is IP address 193.44.34.12? A D B C

C

What protocol translates web addresses into IP addresses? SMTP TFTP DHCP DNS

DNS

Which TCP/IP protocol operates on port 53 using UDP and translatesURLs into Web addresses? HTTP DNS SMTP FTP

DNS

Which layer of the OSI model is divided into two sublayers? Session Network Presentation Data link

Data link

The IP command-line command to determine your computer's IPaddress, subnet mask, and default gateway is ping True False

False

The TCP protocol works at the network layer of the OSI model. True False

False

The first four bytes of the MAC address identify the vendor. True False

False

The name you type into a browser's address bar, such as www.microsoft.com, is known as the IP locator. True False

False

Which TCP/IP protocol operates on port 80 and displays web pages? HTTP FTP SMTP DNS

HTTP

Mohammed needs to open a firewall port so that web traffic can bepassed through the firewall. What protocol is used for web pages, andon which port does it work? HTTP, port 21 DHCP, port 21 DHCP, port 80 HTTP, port 80

HTTP, port 80

Which of the following is a unique hexadecimal number that identifiesyour network card? NIC accress MAC address NIC ID MAC ID

MAC address

Gunther is setting up encrypted remote communications so that theserver administrators can remotely access servers. What protocol isused for remotely logging on to a computer in a secure manner? SSH SMTP Telnet HTTP

SSH

The IP address 127.0.0.1 always refers to your what? Self Nearest router ISP Nearest NAP

Self

An IP version 4 address consists of four numbers, separated by dots.Each number is called a(n) ________. Subnet Bit CIDR Octet

Octet

A(n) __________ hides the internal network's IP address and presentsa single IP address to the outside world. Intrusion detection system Proxy server Network Monitor Firewall

Proxy server

You are assigned with attaching connectors to segments of cable.What type of connector is used with network cables? RJ-85 RJ-12 RJ-11 RJ-45

RJ-45

Which device is used to boost a signal? Repeater Hub Switch Router

Repeater

Which device can relay packets from one network to another and isusually programmable? Hub Switch Router Repeater

Router

Which of the following is a device used to connect two or morenetworks? NIC Hub Router Switch

Router

Which TCP/IP protocol operates on port 25 and sends email? DNS FTP SMTP HTTP

SMTP

What protocol is used to send email, and on what port does it work? POP3, port 110 SMTP, port 10 SMTP, port 25 POP3, port 25

SMTP, port 25

Which device can connect many computers and sends data only out of one port based on MAC address? Switch Repeater Router Hub

Switch

You are explaining the history of networking to a group of freshmenstudents. What did Vince Cerf invent? Email The World Wide Web The first computer virus. TCP

TCP

You are explaining the history of networking to a group of freshmenstudents. What did Tim Berners-Lee invent? The World Wide Web Email The first computer virus TCP

The World Wide Web

How big is a TCP packet header? The size depends on the data being sent. The size is always 20 bytes. The size depends on the protocol being used. The size is always 40 bytes.

The size is always 20 bytes.

Sheryl is explaining the OSI model to new technicians at her company.She is trying to explain what protocols operate at the various layers ofthe OSI model. At what layer of the OSI model does TCP operate? Network Data link Transport Application

Transport

A host is a machine with data on it, to which you can connect. True False

True

MAC addresses are unique addresses for each NIC. True False

True

No protocols operate at the physical layer of the OSI model. True False

True

The notation used to perform variable-length subnet masking for IPaddresses is CIDR. True False

True

The session layer of the OSI model provides the mechanism tomanage the dialogue between end-user application processes. True False

True

Which of the following was one of the three universities involved in theoriginal distributed network setup by a government agency? UC Berkeley Princeton MIT Harvard

UC Berkeley

Malek is purchasing cable to use in setting up small office networks.He wants to stock up on commonly used cable. What type of cable domost networks use? Phone cable Net cable STP UTP

UTP

Internet addresses in the form of www.chuckeasttom.com are calledwhat? Uniform address identifiers User-accessible web addresses Uniform resource locators User-friendly web addresses

Uniform resource locators

What type of cable is used in most networks? Shielded untwisted-pair Unshielded twisted-pair Shielded twisted-pair Unshielded untwisted-pair

Unshielded twisted-pair

Juan has just installed a new T1 line into a doctor's office. The doctor'sfront desk receptionist has asked what speed they can expect. A T1line sends data at what speed? 1.54Mbps 56.6Kbps 100Mbps 155Mbps

1.54Mbps

What is the binary equivalent of the decimal number 240? 11111100 11111110 11110000 11111000

11110000

Which U.S. government agency created the distributed network thatformed the basis for the Internet? Central Intelligence Agency Advanced Research Project Agency NASA Department of Energy

Advanced Research Project Agency

If an IP address has the number 191 in the first octet, it is a class______ address. C A D B

B

Which TCP/IP protocol operates on ports 20 and 21 and is used fortransferring files between computers? HTTP DNS FTP SMTP

FTP

The IP command-line command to determine the number of hops ittakes to get from your computer to its destination is ping True False

False

John is trying to simply connect three computers in a small network.He does not need any sort of routing capability and is not concernedabout network traffic. What is the simplest device for connectingcomputers? Hub Router NIC Interface

Hub

Which device can connect many computers and sends packets outevery port? Repeater Router Switch Hub

Hub

John is working with command-line utilities to gather diagnosticinformation about a computer that cannot connect to the network.Which utility provides information about a machine's networkconfiguration? Tracert IPConfig MyConfig Ping

IPConfig

Sharice is trying to teach a new technician basic networking terms.What should she tell this new technician NIC stands for? Network Interaction Card Network Interface Card Network Interaction Connector Network Interface Connector

Network Interface Card

What is the name for the point where the backbones of the Internetconnect? Routers Switches Network access point Connectors

Network access point

The IP utility used to test connectivity (e.g. reachable) with a remotehost is _______. CIDR tracert ping whois

ping


Set pelajaran terkait

SPINAL CORD/NERVES True and False

View Set

Insurance 2-40, 200 question exam simulator

View Set

MIIM - 532 - Topic 5: Sexual Reproduction

View Set

Chpt 6 Review Questions - Network Design Elements

View Set

History and Systems of Psychology 1

View Set

Test 4: Toddler/Preschool - Growth/Development

View Set