ITF+ Module 2.7 Explain basic networking concepts

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Q: Which of the following is NOT a valid IP address? A: 192.168.1.256 B: 192.168.1.1 C: 192.168.0.5 D: 192.168.200.200

Answer - A: 192.168.1.256 An IP address is used to logically identify each device (host) on a given network. The address is either a 32-bit binary value (IPV4) or a 128-bit binary value (IPV6). In IPV4, the IP address is broken into four 8-character binary values called octets. This results in a decimal value between 0 and 255 within each octet. In this question, the IP address 192.168.1.256 is NOT valid because the decimal value must be between 0 and 254

Q: Which is NOT a key function of a Small Office Home Office (SOHO) wireless router? A: It provides access to 3G and 4G networks B: It enables wired and wireless computers to connect to the Internet C: It can be configured to prioritize certain types of network traffic D: It allows multiple users to be connected to a network at the same time

Answer - A: It provides access to 3G and 4G networks

Q: What hardware device is used to obtain Internet access when the service provider delivers a coaxial cable? A: Modem B: Firewall C: An access point D: Switch

Answer - A: Modem

Q: What is the advantage of downloading files from a site that begins with HTTPS as opposed to HTTP? A: The HTTPS site uses SSL/TLS to encrypt data and provide a secure connection B: The HTTPS site uses TCP/IP to define how messages are formatted, while HTTP does not C: An HTTPS site will cache data locally for faster future visits, whereas an HTTP site will not D: Files are transferred faster over HTTPS than over HTTP

Answer - A: The HTTPS site uses SSL/TLS to encrypt data and provide a secure connection

Q: What is the primary difference between a LAN and a WAN? A: The geographic distance between the devices that are being networked B: The speed of the devices that are being networked C: The connection type of the devices being networked D: The number of devices that are being networked

Answer - A: The geographic distance between the devices that are being networked

Q: What does Internet Message Access Protocol 4 (IMAP4) allow a user to do that Post Office Protocol 3 (POP3) does not? A: View the same email from many different devices B: Download and send attachments to other email users C: Save emails locally rather than on a central email server D: Use an unlimited amount of inbox storage space

Answer - A: View the same email from many different devices Because IMAP4 stores emails on the server end as opposed to the client end, it allows users to access the same email from many different devices. This means that when you check your email from a different laptop or mobile device, you see the same messages. Both POP3 and IMAP4 allow users to download and send attached files. Saving emails to a local machine is a characteristic of POP3, not IMAP4. It is rare for users of IMAP4 to have an unlimited mailbox size, as emails are stored on a server. Most companies impose a mailbox limit to manage the storage capacity on email servers.

Q: What protects a network by denying specific types of incoming traffic? A: A TCP/IP accelerator appliance B: Firewall appliance C: Antivirus software D: Diagnostic software

Answer - B: Firewall appliance

Q: How many Ethernet LAN ports are typically found on a Small Office Home Office (SOHO) network switch? A: 254 B: Four to eight C: 24 to 48 D: One

Answer - B: Four to eight

Q: What is the networking term that describes the total time it takes a data packet to travel from one node to another? A: Availability B: Latency C: Bandwidth D: Throughput

Answer - B: Latency Latency is the term used to describe the total time it takes a data packet to travel from one node to another. This is often measured in milliseconds (ms). The greater the latency, or "lag," the higher this number will be. Availability refers to how long the network stays up and operational without interruption, and how quickly it can recover should it go down. Bandwidth refers to the maximum amount of data that can be transmitted over a medium in a given time. Throughput refers to the actual amount of data that is transmitted over a medium in a given time.

Q: What is packet switching? A: The method used to assign names to hosts and networks and to convert these names into IP addresses B: The ability of one computer to forward information to another using any available pathway C: An encryption technique used in web browsing to authenticate the client/server and to encrypt in-transit data D: A suite of network transport protocols that work in layers, each with defined functions

Answer - B: The ability of one computer to forward information to another using any available pathway

Q: How does a Uniform Resource Locator (URL) get translated to an Internet Protocol (IP) address? A: Using the Secure Sockets Layer (SSL) B: Using the Domain Name System (DNS) resolution process C: Using the HyperText Transfer Protocol (HTTP) D: Using the local address resolution process

Answer - B: Using the Domain Name System (DNS) resolution process

Q: What is the basic function of a router? A: It is a virus and malware filter for a LAN B: It creates the LAN for a set of computers C: It forwards TCP/IP packets between dissimilar networks D: It prevents electric surges by routing them to ground

Answer - C: It forwards TCP/IP packets between dissimilar networks The basic function of a router is to forward TCP/IP packets between dissimilar networks. In Small Office Home Office (SOHO) networks, a router connects to the Internet via a WAN link. In enterprise environments, a router connects to other infrastructure devices including switches, firewalls, Intrusion Detection Systems (IDS). A device that creates the LAN for a set of computers is either a switch for wired networks or a Wireless Access Point (WAP) for wireless networks. Filtering for viruses and malware on a LAN is often performed by the Intrusion Detection System (IDS). Preventing damage to equipment from electrical surges is a secondary function of an Uninterruptible Power Supply (UPS).

Q: Which feature of a wireless router allows you to specify precisely which wireless clients may join your network? A: Port triggering B: Quality of Service C: MAC filtering D: Port forwarding

Answer - C: MAC filtering

Q: The Post Office Protocol v3 (POP3) protocol is for incoming mail. Which protocol is used for outgoing mail? A: WEP B: PGP C: SMTP D: SNMP

Answer - C: SMTP The Simple Mail Transfer Protocol (SMTP) is responsible for sending messages between mail servers and for sending messages from email client software to the server. SMTP can be used with traditional settings that transmit information in plain text or in coordination with SSL to send messages encrypted. Wired Equivalent Privacy (WEP) is a wireless security protocol, not an email protocol. The Simple Network Management Protocol (SNMP) is used to locate and manage systems on a network and is not used for sending emails. The Pretty Good Privacy (PGP) is used for data encryption and decryption. It can be used to encrypt attachments that are sent via email but it is not used to actually transmit the email.

Q: What limitation should you be aware of when applying Media Access Control (MAC) filtering on your network devices? A: The risk of data packet collisions between connected client devices could potentially increase B: Some connected client devices might need access to specific traffic that is being filtered out C: You will need to modify the safe list for each new authorized client device going forward D: Throughput is likely to be impacted, since the filtering device must constantly check the status of connected client devices

Answer - C: You will need to modify the safe list for each new authorized client device going forward When applying MAC filtering on your network devices, you will need to modify the safe list, often called a whitelist, for each new authorized client device going forward. Filtering traffic is a service performed by firewalls based on a ruleset. MAC filtering uses a whitelist to authorize access to a network.

Q: What protocol is used to retrieve email from a server and supports multiple clients connecting to the same mailbox simultaneously? A: Message Application Programming Interface (MAPI) B: Post Office Protocol v3 (POP3) C: Multipurpose Internet Mail Extensions (MIME) D: Internet Message Access Protocol (IMAP)

Answer - D: Internet Message Access Protocol (IMAP) The Internet Message Access Protocol (IMAP) supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously. IMAP is used to retrieve emails from a server's message store. The Post Office Protocol v3 (POP3) is also used to retrieve emails; however, POP3 does not support multiple-client simultaneous access. The Multipurpose Internet Mail Extensions (MIME) is an encoding technique used to transmit text messages and binary file attachments by email. The Message Application Programming Interface (MAPI) is used by email client software to send a message to a Microsoft Exchange email server.

Q: Which term describes a group of computers and devices that share resources without a router within a small geographical area? A: WAP B: SAN C: WAN D: LAN

Answer - D: LAN A Local Area Network (LAN) is a group of computers and devices that share resources (without a router) within a small geographic area. A LAN can be a few connected computers, or it can comprise hundreds of computers and devices. A Storage Area Network (SAN) is a network that provides access to consolidated data storage. A Wide Area Network (WAN) is a network of computers that are spread across a large geographic area. A WAN can also be composed of smaller LANs that are interconnected. A Wireless Access Point (WAP) is a device or software that facilitates communication and provides enhanced security to wireless devices. It can extend the physical range of a Wireless Local Area Network (WLAN).

Q: What device is capable of performing packet switching? A: Firewall B: Switch C: Modem D: Router

Answer - D: Router

Q: What usually happens to email messages when a client accesses them using the Post Office Protocol v3 (POP3)? A: The messages are downloaded to the client and encrypted for storage B: The messages remain on the server and can be accessed from other devices C: The messages are archived to a different folder, keeping read and unread separate D: The messages are downloaded to the client and deleted from the server

Answer - D: The messages are downloaded to the client and deleted from the server With the Post Office Protocol v3 (POP3), email messages are usually deleted from the server when they are downloaded to an email client. This protocol is intended to be used only when a single device or email client application is used. The Internet Message Access Protocol (IMAP) keeps a copy of email messages on the server so that multiple devices can access them. The POP3 protocol does not move email messages to different folders based on whether or not they are read. POP3 does not use folders in the same manner as IMAP. The messages are downloaded to the client; however, encrypting them for storage is not part of the protocol.


Set pelajaran terkait

AI, ChatGPT, Unlimited vacation at Microsoft

View Set

Chapter 7 - Data Warehouse Databases

View Set

Cognitive Psychology Exam 2- Chapter 6

View Set