Network+ Ch3 quiz, Networking Final Quizlet
What device is an example of an Ethernet technology implemented as a star topology?
Hub
26. What is the most popular web server application?
Apache
23. When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, & can cause intermittent errors?
upset failure
You need a network that provides centralized authentication for your users. Which of the following logical topologies should you use? VLANs Peer‐to‐peer Client/Server Mesh
A client/server logical topology allows you to have a centralized database of users so that authentication is provided in one place.
At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. A. True b. False
A. True
33. At what layer of the OSI model does a network switch normally operate?
Layer 2
14. HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
Layer 7
11. The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?
MAC (Media Access Control) address
28. What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
Session Layer
13. In the United States, who is able to activate the Emergency Alert System at the national level?
The President
1. True/False - The term firmware refers to programs embedded into hardware devices. This software only, changes when a firmware upgrade is performed.
True
10. True/False - After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.
True
6. True/False - In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.
True
9. True/False - The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.
True
35. What is the minimal amount of voltage required to damage an electrical component?
10 volts
If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EU1-64 b. IEEE 802.36 c. UUID-128 d. MACin6
b. IEEE 802.36
19. The TCP and UDP protocols both exist at what layer of the OSI model?
Transport
Which network topology is a combination of two or more types of physical or two or more types of logical topologies? Point‐to‐multipoint Hybrid Bus Star
A hybrid topology is a combination of two or more types of physical or logical network topologies working together within the same network.
Which of the following physical topologies has the least likelihood of having a collision? Bus Start Ring Mesh
Only a Mesh physical topology has point‐to‐point connections to every device, so it has the least likelihood of ever having a collision.
8. True/False - Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.
False
What command can be used to check a domain computer's time source from a Command Prompt window? a. date /source b.w32tm/query /source c. ntpd show source d. time --source
b.w32tm/query /source
When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 67 b. port 68 c. port 546 d. port 547
d. port 547
27. An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?
fail-close
37. A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?
fail-open
12. The Data Link Layer utilizes what name for its protocol data unit (PDU)?
frame
24. If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?
star topology
You have a network with multiple devices and need to have a smaller broadcast domain while working with a tight budget. Which of the following is the best solution? Use static IP addresses Add more hubs Implement more switches Create VLANs
If you have a switch, you can break up a layer‐2 switched networks into smaller broadcast domains by creating VLAN's.
In what type of network are all computers considered equals and do they not share any central authority? Peer‐to‐peer Client‐server Physical topology None of the above
In a peer‐to‐peer network, all computers are considered equals. It is up to the computer that has the resource being requested to perform a security check for access rights to its resources.
Which of the following is an example of a LAN? Ten buildings interconnected by Ethernet connections over fiber‐optic cabling Ten routers interconnected by frame‐relay circuits Two routers interconnected with a T1 circuit A computer connected to another computer so they can share resources
LANs generally have a geographic scope of a single building or smaller. They can range from simple (two hosts) to complex (with thousands of hosts).
Which network topology or connection type can be implemented with only two endpoints?
Point‐to‐point
40. What mail protocol is used to send mail messages to a server?
SMTP
38. What statement accurately reflects what occurs when a message is too large to transport oil a network?
The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
30. What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?
The packet will be divided into smaller packets using fragmentation.
36. Which of the following is not one of the disadvantages of peer-to-peer networks?
They centralize user account logins
What does VLAN stand for?
Virtual local area network (LAN)
What does VPN stand for?
Virtual private network
What is a difference between a LAN and a WAN? WANs need a special type of router port. WANs cover larger geographical areas. WANs can utilize either private or public data transport. All of the above.
All of the above. A typical WAN connects two or more remote LANs together using someone else's network (your ISP's) using a router. Your local host and router see these networks as remote networks and not as local networks or local resources.
Which LAN topology is characterized by all devices being daisy‐chained together with the devices at each end being connected to only one other device?
Bus
What are the three primary LAN topologies?
Bus, ring, and star
Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 22 b. UDP 161 C. TCP 3389 d. UDP 10000
C. TCP 3389
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. traceroute b. ifconfig C. ping d. route
C. ping
What network model draws a clear distinction between devices that share their resources and devices that do not?
Client/server
22. What is a defining characteristic of a bus topology based network?
Devices are daisy-chained together in-a single line.
2. True/False - The Data Link layer attaches a trailer to the end of a packet, and does not include a header.
False
3. True/False - Static electricity is an electrical charge in motion.
False
4. True/False - The protocol data unit for the Physical layer of the OSI model is payload, or data.
False
5. True/False - The Transmission Control Protocol (TCP) is considered to be a connectionless or best-effort delivery protocol.
False
7. True/False - The Transport layer header addresses a. receiving application by a number called a MAC address.
False
Which of the following is a concern when using peer‐to‐peer networks? Where to place the server Whose computer is least busy and can act as the server The security associated with such a network Having enough peers to support creating such a network
Security is easy to relax in a peer‐to‐peer environment. Because of the trouble it takes to standardize authentication, a piecemeal approach involving users' personal preferences develops. There are no dedicated servers in a peer‐to‐peer network, and such a network can be created with as few as two computers.
Will a computer that shares no resources most likely be connected to the backbone or to a segment?
A segment
A hexadecimal number is a number written in the base 16 number system. A. True b. False
A. True
Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. A. True b. False
A. True
UDP port 123 is utilized by the Network Time Protocol service A. True b. False
A. True
When using IPv6, two or more nodes on the same link are said to be neighbors. A. True b. False
A. True
39. In a domain, the process of allowing a user to sign on to the network from any computer on, the network and get access to resources is managed by what service?
Active Directory Domain Services (AD DS)
What advantage does the client‐server architecture have over peer‐to‐peer? Easier maintenance Greater organization Tighter security All of the above
All of the above In client‐server networks, requests for resources go to a main server that responds by handling security and directing the client to the resource it wants, instead of the request going directly to the machine with the desired resource (as in peer‐to‐peer).
When designing a network and deciding which type of network topology to use, which item(s) should be considered? (Select all that apply.) Cost Ease of installation Ease of maintenance Fault‐tolerance requirements
All. Each topology has its own set of pros and cons regarding implementation, so asking the right questions and considering cost, ease of installation, maintenance, and fault tolerance are all important factors to be considered.
15. In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?
Application
What type of topology gives you a direct connection between two routers so that there is one communication path? Point‐to‐point Star Bus Straight
As its name implies, in a point‐to‐point topology you have a direct connection between two routers, giving you one communication path. The routers in a point‐to‐point topology can either be linked by a serial cable, making it a physical network, or be far away and only connected by a circuit within a frame‐relay network, making it a logical network.
What statement regarding the Server Message Block protocol is accurate? a. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a signaling protocol used to make a connection between hosts prior to data transfer. d. It is a protocol used for accessing network-based LDAP directories.
B. It is used by Windows and UNIX-based operating systems to share files.
21. What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?
IP address
In a physical‐star topology, what happens when a workstation loses its physical connection to another device? The ring is broken, so no devices can communicate. Only that workstation loses its ability to communicate. That workstation and the device it's connected to lose communication with the rest of the network. No devices can communicate because there are now two unterminated network segments.
In a star topology, each workstation connects to a hub, switch, or similar central device, but not to other workstations. The benefit is when connectivity to the central device is lost, the rest of the network lives on.
Which type of topology has the greatest number of physical connections? Point‐to‐multipoint Star Point‐to‐point Mesh
In the mesh topology, there is a path from every machine to every other one in the network. A mesh topology is used mainly because of the robust fault tolerance it offers—if one connection goes on the blink, computers and other network devices can simply switch to one of the many redundant connections that are up and running.
25. The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?
Material Safety Data Sheet (MSDS)
What common WAN topology often results in multiple connections to a single site, leading to a high degree of fault tolerance?
Mesh
31. At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
Network
18. What federal agency is charged with safety and health in the workplace?
Occupational Safety and Health Administration (OSHA)
29. In the TCP/IP model, what layer is considered so simple that it is ignored entirely?
Physical
20. The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?
Remote Desktop Protocol (RDP)
16. What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?
SNMP
What is the term for a device that shares its resources with other network devices?
Server
34. In considering the responsibilities of each layer of the e OSI model, what statement accurately reflects those of the Presentation layer?
The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
17. Which of the following is an example of encapsulation?
The addition of a header to data inherited from the layer above in the OSI model.
An example of a hybrid network is which of the following? Ethernet Ring topology Bus topology Star topology
The best answer to this question is Ethernet, which uses a start physical topology with a logical bus technology
You want to remotely log into an office computer using remote desktop in a secure manner. Which of the following should you use? VPN Tagged packets VLANs Telnet SSH
To connect to remote office securely, you need to use a Virtual Private Network (VPN).
You need a topology that is scalable to use in your network. Which of the following will you install? Bus Ring Star Mesh
To install a physical topology that provides ease of scalability use a star network. This is a hub or switch device, and this is the most common LAN networks today.
What is a logical grouping of network users and resources connected to administratively defined ports on a switch? Host Hub VLAN VTP
VLANs allow you to be anywhere on the physical network and still be local to the network resources you need.
What does the acronym VPN stand for? Virtual processor network Virtual passive network Virtual private network Variable‐length private network
Virtual private networks (VPNs) allow for the creation of private networks across the Internet. A VPN makes your local host part of the remote network by using the WAN link that connects you to the remote LAN.
Which of the following is an example of when a point‐to‐multipoint network is called for? When a centralized office needs to communicate with many branch offices When a full mesh of WAN links is in place When multiple offices are daisy‐chained to one another in a line When there are only two nodes in the network to be connected
When a central office, such as a headquarters, needs to communicate directly with its branch offices, but the branches do not require direct communication with one another, the point‐to‐multipoint model is applicable. The other scenarios tend to indicate the use of a point‐to‐point link between sites.
Which of the following is a disadvantage of the star topology? When a port on the central concentrating device fails, the attached end device loses connectivity to the rest of the network. When the central concentrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network. In a star topology, a more expensive type of host must be used when compared to the host used when implementing a physical bus. It is more difficult to add stations and troubleshoot than with other topologies
When the central concentrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network. However, this topology makes troubleshooting easier; if the entire network fails, you know where to look first. The central device also ensures that the loss of a single port and the addition of a new device to an available port do not disrupt the network for other stations attached to such a device.
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Two different IPv4 address spaces will exist on the same network segment. b. Both IPv4 and IPv6 protocols will be used on the network. c. The router serving the network will have a redundant spare. d. The network will exist on two separate segments, separated by a proxy.
b. Both IPv4 and IPv6 protocols will be used on the network.
An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. A. True b. False
b. False
DNS follows a centralized database model, allowing for easier management of DNS records. A. True b. False
b. False
ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs A. True b. False
b. False
The 1024 - 65535 range of ports is also known as the "well-known" range. A. True b. False
b. False
The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. A. True b. False
b. False
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ipconfig /all b. ifconfig -a c. ip show d. if status
b. ifconfig -a
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer has been assigned a routed public IP address. b. The network card has been erroneously assigned a loopback address. c. The computer is configured to use DHCP, but was unable to lease an address. d. The network card is set up for multicast communication.
c. The computer is configured to use DHCP, but was unable to lease an address.
What is by far the most popular DNS server software available? a.Microsoft DNS b. Dnsmasq c. Oracle Resolver d. BIND
d. BIND
32. In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire?
fire suppression agent