Networking - 101 -Test 1 flash cards

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the speed of an OC-3 connection? 45 Mbps 622 Mbps 34 Mbps 155 Mbps

155 Mbps Explanation: Optical Carrier (OC) is used to specify the speed of fiber optic networks conforming to the SONET standard. Common OC speeds are: OC-1 = 51.85 Mbps OC-3 = 155.52 Mbps OC-12 = 622.08 Mbps OC-24 = 1.244 Gbps OC-48 = 2.488 Gbps OC-192 = 9.952 Gbps T3 is 44.736 Mbps. E3 is 34.368 Mbps.

You have installed an ISDN connection in your home so you can connect to the internet and talk on the phone at the same time. While you are talking on the telephone, what is your internet connection's maximum data rate? 128 Kbps 64 Kbps 1.544 Mbps 56.8 Kbps

64 Kbps Explanation: Your ISDN (integrated services digital network) line has two B channels. Each B channel transmits data at 64 Kbps, giving you a maximum of 128 Kbps. However, one of your B channels is being used when you use the phone, so the maximum speed while the phone is in use is 64 Kbps.

In virtualization, what is the role of a hypervisor? A hypervisor has the actual hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM, and motherboard. A hypervisor is a software implementation that executes programs like a physical machine. A hypervisor is created within the host operating system and simulates a hard disk for the virtual machine. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. Explanation: A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor manages access to system resources such as: CPU Storage RAM A physical machine (also known as the host operating system) has the actual hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM, motherboard, etc. A virtual machine is a software implementation that executes programs like a physical machine. A virtual machine appears to be a self-contained and autonomous system. A virtual hard disk (VHD) is a file that is created within the host operating system and simulates a hard disk for the virtual machine.

Which of the following are characteristics of MPLS? (Select two.) Adds labels to data units Is a local loop technology Uses a committed information rate (CIR) Supports variable-length data units Uses fixed-length data units

Adds labels to data units Supports variable-length data units Explanation: MPLS is a WAN data classification and data-carrying mechanism. MPLS is a packet-switching technology that supports variable-length data units. MPLS adds a label to packets between the existing Network and Data Link layer formats. Labels are added when the packet enters the MPLS network and removed when the packet exits the network. Information in the label is used to switch the packet through the MPLS network to the destination. MPLS labels can identify the route or even the network type to use. MPLS labels are often used to provide different classes of service for data streams. ATM uses labels but uses fixed-length cells. ISDN is a local loop technology. Frame relay uses the committed information rate (CIR) to define levels of service.

You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem for the business. The business has four computers that need to communicate with each other and the internet. The ISP's cable modem has only one RJ45 port. You need to set up the network within the following parameters: You must spend as little money as possible. You must not purchase unnecessary equipment. Computers need to have a gigabit connection to the network. New devices should not require management or configuration. You examine each computer and notice that only one of the four computers has a wireless NIC. They all have Ethernet NICs. What should you purchase? A wireless AP and three new wireless NICs. An unmanaged switch and CAT 5e cabling. A new cable modem with a built-in switch and CAT 6a cabling. A hub and CAT 5e cabling. A managed switch and CAT 6 cabling.

An unmanaged switch and CAT 5e cabling. Explanation: You should purchase an unmanaged switch and CAT 5e cabling. Switches offer guaranteed bandwidth to each switch port and full-duplex communication. Unmanaged switches are autonomous in their function, requiring no port management or configuration. CAT 5e cabling supports transfer speeds up to 1,000 Gbps. Purchasing a new cable modem with a built-in switch would be more expensive than an unmanaged switch. Additionally, CAT 6a cabling is unnecessary for this type of network. Because all of the computers already have wired NICs, purchasing a wireless AP and three new wireless NICs would introduce new costs. The wireless AP would also require additional management and configuration. Hubs suffer from collisions, so only half-duplex communication is possible. This also wouldn't support 1,000 Gbps speeds. A small business with four computers doesn't need the additional features that a managed switch provides.

Match each networking function or device on the left with its associated OSI model layer on the right. Application layer HTTP Presentation layer Switch Transport layer Session ID number Network layer Translates data Data Link layer Modem Physical layer Router

Application layer HTTP Presentation layer Translates data Session layer Session ID number Transport layer Port Number Network layer Router Data Link layer Switch Physical layer Modem Explanation: The following table describes how devices function at different layers of the OSI model: HTTP functions at the Application layer. Encapsulation happens at the Presentation layer. Session IDs are assigned at the Session layer. Port numbers are assigned at the Transport layer. Routers function at the Network layer. Switches function at the Data Link layer. Modems function at the Physical layer.

Which of the following topologies connects all devices to a trunk cable? Ring Mesh Star Bus

Bus Explanation: A bus topology connects all devices to a trunk cable. A ring topology connects neighboring nodes until they form a ring. A star topology uses a hub or switch to connect all network connections to a single physical location. A mesh topology exists when there are multiple paths between any two nodes on a network.

Which of the following are advantages of virtualization? (Select two.) Redundancy of hardware components for fault tolerance. Improved detection of host-based attacks. Reduced utilization of hardware resources. Centralized administration. Easy system migration to different hardware.

Centralized administration. Easy system migration to different hardware. Explanation: Virtualization allows a single physical machine (known as the host operating system) to run multiple virtual machines (known as the guest operating systems). The virtual machines appear to be self-contained and autonomous systems. Advantages of virtualization include: Server consolidation. The ability to migrate systems between different hardware. Centralized management of multiple systems. Increased utilization of hardware resources. Isolation of systems and applications. Disadvantages of virtualization include: A compromise in the host system could affect multiple guest systems. A failure in a shared hardware resource could affect multiple systems.

What is the purpose of a frame check sequence (FCS) footer? Contain logical network addresses Hold segment data Control information Checksum error detection

Checksum error detection Explanation: The Link layer converts packets into frames, adding physical device addressing information and a frame check sequence footer for error detection. It also converts the frames into bits (0s and 1s) for transmission across the transmission media. Control information is added at the Transport layer. The Transport layer breaks the data into pieces called segments. The Internet layer converts the segments into packets, adding logical network and device addresses.

You've implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but they don't host services of their own. Which type of network do you have? Client-server Extranet Intranet Peer-to-peer

Client-server Explanation: In a client-server network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources. In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts, and each host is in charge of controlling access to those resources. An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. An extranet is a private network that uses internet technologies, but whose resources are made available to external (but trusted) users. For example, you might create a website on a private network that only users from a partner company can access.

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discovered that the Windows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. The organization still needs to use the Windows 2000 workstations, which need to be connected to the internet, but you want to make sure the network is protected from future events. Which solution should you implement to protect the network while also allowing operations to continue as normal? Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. Install antivirus software on the Windows 2000 workstations and configure Windows to automatically download and install updates. Create a dedicated network for the Windows 2000 workstations that's completely isolated from the rest of th

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. Explanation: The best solution is to place the Windows 2000 workstations in their own VLAN. If you use VLAN network segmentation, the workstations will still have access to the internet, but network access can be heavily restricted. This greatly reduces the damage a workstation can cause if it were to become compromised again. Legacy operating systems, such as Windows 2000, are easy targets for attackers. This is because legacy operating systems use outdated protocols and have known exploits. Installing an antivirus or host-based firewall would do very little to protect the entire network. In addition, legacy operating system are no longer supported with updates or patches, so enabling automatic updates would offer no benefit. Creating a dedicated network for the workstations would affect normal operations and also increase network management load.

You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your test virtual machines has a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. What should you do? (Select two. Each response is one part of the complete solution.) Create a new virtual switch configured for internal networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. Create a new virtual switch configured for host-only networking. Create a new virtual switch configured for bridged (external) networking. Disable the switch port that the hypervisor's network interface is connected to.

Connect the virtual network interfaces in the virtual machines to the virtual switch. Create a new virtual switch configured for bridged (external) networking. Explanation: To allow the virtual machines to communicate with the Microsoft update servers on the internet, complete the following: Create a new virtual switch configured for bridged (external) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. Creating an internal or host-only virtual switch would not allow the virtual machines to communicate on the production network through the hypervisor's network interface. Disabling the hypervisor's switch port would also isolate the virtual machines from the production network.

Which of the following tasks is associated with the Session layer? Connection establishment IP address assignment Data block breakdown Port number assignment

Connection establishment Explanation: Connection establishment is controlled through Session layer protocols. The Transport layer breaks down data into blocks called segments. It then appends a port number to identify which top-layer application needs to receive the data on the destination device. One very important thing that happens at the Network layer is IP address assignment.

Amber's employer has asked her to research what is needed to best utilize current assets in creating a scalable network. Amber knows that the company has two very robust servers. What is her BEST solution? Convert the current servers to host servers using Type 2 hypervisors. Sell the current assets and purchase specially made Type 2 hypervisor servers for virtualization. Convert the existing servers into host servers for virtualization using a Type 1 hypervisor. Do nothing since everything is moving to the cloud.

Convert the existing servers into host servers for virtualization using a Type 1 hypervisor. Explanation: She should convert the existing servers into host servers for virtualization using a Type 1 hypervisor. This has minimal expense and utilizes existing assets. There are no specially made Type 2 hypervisor servers. Moving to the cloud is expensive and does not utilize current assets. Only a Type 1 hypervisor can be used in a bare metal installation. Type 2 only work on computers that have an OS installed.

What is the basic purpose of the OSI Physical layer? Maintain a list of known networks and neighboring routers. Coordinate rules for sending and receiving electrical signals. Define when devices have access to the LAN. Define how physical network devices are identified on a network.

Coordinate rules for sending and receiving electrical signals. Explanation: The OSI Physical layer sets standards for sending and receiving electrical signals between devices. The Data Link layer defines how physical network devices are identified on a network and when devices have access to the LAN. The Network layer maintains a list of known networks and neighboring routers.

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your test virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Each response is one part of the complete solution.) Connect the virtual network interfaces in the virtual machines to the virtual switch. Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces. Disable the switch port that the hypervisor's network interface is connected to. Disconnect the network cable from the hypervisor's network interface. Create a new virtual switch configured for bridged (external) networking. Create a new virtual switch configured for host-only (internal) networking.

Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. Explanation: To allow the virtual machines to communicate with each other while isolating them from the production network, complete the following: Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. Creating a bridged virtual switch would still allow the virtual machines to communicate on the production network through the hypervisor's network interface. Disconnecting the hypervisor's network cable, blocking the virtual machine's MAC addresses, or disabling the hypervisor's switch port would isolate the virtual machines from the production network, but this would also prevent them from communicating with each other.

In the OSI model, which of the following functions are performed at the Presentation layer? (Select two.) Data frame transmission Data format specifications Network services End-to-end flow control Data encryption and compression

Data format specifications Data encryption and compression Explanation: The Presentation layer encrypts data, changes and converts character sets, and compresses data. File formats (such as .jpg, .wmv, and .wav) are part of the Presentation layer. The Application layer provides network services. End-to-end flow control is provided by the Transport layer. Frame transmission occurs at the Physical layer.

Which of the following functions are performed at the Physical layer of the OSI model? Host and network identification Data translation and formatting Session ID assignment Data movement across network cables

Data movement across network cables Explanation: The Physical layer is concerned with how to transmit data and how to connect network hosts. The Presentation layer formats and translates data between systems. The Network layer identifies hosts and networks by using logical addresses. The Session layer assigns a session ID to each session to keep data streams separate.

Which of the following functions are performed by the OSI Transport layer? (Select three.) Path identification and selection Packet formatting for delivery through the medium Media access control, logical topology, and device identification Reliable message delivery Data segmentation and reassembly Consistent data formatting between dissimilar systems End-to-end flow control

Data segmentation and reassembly Reliable message delivery End-to-end flow control Explanation: The Transport layer is responsible for breaking upper-layer data into segments and allowing reliable communication through end-to-end flow control, error detection, and error correction. Message transmission through a medium is performed at the Physical layer. Media access, logical topology, and device identification occur at the Data Link layer. Path identification and selection is a function of the Network layer. Data formatting is performed at the Presentation layer.

Which of the following are included as part of the Data Link layer specifications? (Select two.) Cable and connector specifications Physical topology Physical network device identification Data transmission between hosts Digital data conversion

Data transmission between hosts, and Physical network device identification. Explanation: The Data Link layer controls device identification on networks, as well as how messages travel through the network (the logical topology). The other functions listed here are performed by the Physical layer.

You have a network that's connected using a full physical mesh topology. The link between Device A and Device B is broken. Which of the following BEST describes the effect that this will have on network communications? Device A will not be able to communicate with any other device. Device A will be able to communicate with all other devices. No devices will be able to communicate with any other device. Device A will be able to communicate with any device except for Device B.

Device A will be able to communicate with all other devices. Explanation: With a mesh topology, a break in a single link has no effect on communications. Data can be routed to the destination device by taking a different (sometimes longer) path through the mesh topology.

Cheryl, the network administrator, has been asked to create a virtual machine that can run an application without any modifications to the OS. What is her BEST option to accomplish this task? Paravirtualization Full virtualization Partial virtualization Enterprise-level virtualization

Full virtualization Explanation: Full virtualization does not require any modifications to run applications. In partial virtualization, only some of the components of the virtual machine are virtualized. This requires operating systems or applications to be modified before they can run in a partial virtualization environment. Paravirtualization requires that operating systems and applications be modified as well.

What is the most common form of virtualization? Partial virtualization Local machine virtualization Full virtualization Paravirtualization

Full virtualization Explanation: Full virtualization is by far the most common and flexible type of virtualization. In partial virtualization, only certain applications can be run. This limits its use. Paravirtualization requires that an OS be modified before installation. Not all OSs can be modified, making this a limited-use type. Local machine virtualization is not a form of virtualization.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? Route VM-to-VM traffic through a physical firewall and back to the virtual network. Create a virtual router with VRF technology. Implement a virtual firewall within the hypervisor. Define VLAN memberships on each VM.

Implement a virtual firewall within the hypervisor. Explanation: Virtualized hosts are susceptible to the same network exploits as physical network hosts and need to be protected by a firewall. By implementing a virtual firewall within the hypervisor itself, you can monitor and filter traffic on the virtual network as it flows between virtual machines. While routing VM-to-VM traffic through a physical firewall would work, it is very inefficient. A virtual router with VRF (Virtual Route Forwarding) is used to create multiple networks from a single router interface. Configuring VLAN membership would not allow you to monitor and filter traffic.

In the OSI model, which of the following functions are performed at the Application layer? (Select two.) Integration of network functionality into the host operating system. Communication setup, maintenance, and teardown. Device control for data transmission rates. Enabling of communication between network clients and services. Standard setting for sending and receiving

Integration of network functionality into the host operating system. Enabling of communication between network clients and services. Explanation: The Application layer enables network services and integrates network functionality into the host operating system. Applications actually run above the OSI Application layer. The setup, maintenance, and teardown of communication happens at the Session layer. The Data Link layer controls the rate of data transmission between hosts (flow control). The Physical layer sets standards for sending and receiving electrical signals between devices.

The Data Link layer of the OSI model is comprised of two sublayers. Which two are they? MAC PAN CRC ARP LLC

MAC and LLC Explanation: The Data Link layer is split into the following sublayers: The Logical Link Control (LLC) sublayer, which provides the operating system a link to the device driver. The Media Access Control (MAC) sublayer, which translates generic network requests into device-specific terms. Cyclic redundancy check (CRC) is a mathematical value that helps a receiving device identify any errors that might have have occurred during transmission. A personal area network (PAN) is a small network for communication between personal devices. Address Resolution Protocol (ARP) is a protocol associated with the Internetwork layer of the TCP/IP model.

Which of the following technologies uses variable-length packets, adds labels to packets as they enter the WAN cloud, and uses the labels to switch packets and prioritize traffic? MPLS SONET ISDN ATM

MPLS Explanation: MPLS is a WAN data classification and data-carrying mechanism. MPLS is a packet-switching technology that supports variable-length frames. MPLS adds a label to packets between the existing Network and Data Link layer formats. Labels are added when the packet enters the MPLS network and removed when the packet exits the network. Information in the label is used to switch the packet through the MPLS network to the destination. MPLS labels can identify the route or even the network type to use. MPLS labels are often used to provide different classes of service for data streams. ATM is a WAN communication technology that uses labels but has fixed-length cells of 53 bytes. Frame relay is a protocol used to connect to a WAN over dedicated (leased) lines. ISDN is a WAN technology that provides increased bandwidth within the local loop. SONET is a standard for networking over an optical medium. SONET is classified as a transport protocol in that it can carry other types of traffic, such as ATM, Ethernet, and IP. Most PSTN networks use SONET within the long-distance portion of the network.

You want to implement a fault-tolerant topology as you connect routers on your wide area network. Which of the following topologies meets your needs? Ring Bus Star Mesh

Mesh Explanation: A mesh topology has multiple connections at each node, increasing connectivity fault tolerance. None of the other topologies have native fault tolerance built in.

You have a network that uses a logical bus topology. How do messages travel through the network? Messages are sent to a central device that forwards them to the destination devices. Messages are sent directly to the correct destination device. Messages are broadcast to all devices connected to the network. Messages travel from one device to the next until they reach the destination device.

Messages are broadcast to all devices connected to the network. Explanation: Messages sent using a physical bus topology are broadcast to all devices on the network. The device in the middle of a star topology, which is typically a hub, receives the message and forwards it on to all other devices. In a ring topology, messages travel from one device to the next until they reach the destination device.

Which kind of connectivity device must you use in order to access the internet through the PSTN? CSU/DSU TDMA Modem Switch

Modem Explanation: To establish a connection to the internet through the public switched telephone network (PSTN/POTS), you must use a modem (modulator/demodulator), which converts digital PC data into analog signals that can be transmitted through standard telephone lines. A CSU/DSU is required for a network to send signals on a T1 line. Time-division multiple access (TDMA) technology allow multiples connections on the same frequency. Use a switch to create additional collision domains on a LAN.

Which key advantage does a virtual router have over a physical router? Multiple networks can connect to a single interface. It has faster routing performance. Routing protocols are not necessary for routing data between networks. It allows Virtual Router Redundancy Protocol (VRRP).

Multiple networks can connect to a single interface. Explanation: The key advantage to a virtual router is that it can support multiple networks on a single router interface. A virtual router does this by using a different routing table for each network. Physical routers are limited to a single network on each interface. Like physical routers, virtual routers use routing protocols to route data between networks. VRRP is used by physical routers to specify backup routers in the case of failure. Virtual routers do not offer significant performance increases.

Which of the following statements are true about virtual NICs? (Select two.) Multiple virtual NICs can be added to a virtual machine. The type of NIC installed in the physical machine determines the type of virtual NIC that is emulated. Virtual NICs need the appropriate driver to function. Virtual NICs don't have a MAC address. Virtual NICs can only communicate with other virtual NICs.

Multiple virtual NICs can be added to a virtual machine. Virtual NICs need the appropriate driver to function. Explanation: Within each virtual machine, you can configure one or more virtual network interfaces, which function similarly to physical network interfaces. Virtual interfaces use Ethernet standards to transmit and receive frames on a network. The operating system within the virtual machine must have the appropriate driver installed to support the virtual network interface, just as with a physical network interface. When you configure a virtual network interface within a virtual machine's configuration, you can specify: The type of physical network interface to emulate. This allows the best possible driver support from the operating system within the virtual machine. A MAC address. Most hypervisors automatically assign a MAC address to each virtual network interface. Some hypervisors allow you to use a custom MAC address if needed. The network to connect to. Most hypervisors allow you to define many different virtual networks. When you configure a virtual network interface, you select which virtual network you want it to connect to.

You have a network that's connected using a physical bus topology. One of the cables that connects a workstation to the bus breaks. Which of the following BEST describes the effect that this will have on network communications? Only devices on one side of the break will be able to communicate with each other, while only devices on the other side of the break will be able to communicate with each other. Devices on one side of the break will be able to communicate with each other, while devices on the other side will not be able to communicate. All devices will be able to communicate. No devices will be able to communicate. All devices except the device connected with the drop cable will be able to communicate.

No devices will be able to communicate. Explanation: Only the one cable, the end no longer means that the end of the network bus is terminated. For this reason no devices can communicate with each other, due to the cord being rendered useless.

Which of the following describes the lines used in a local loop for dial-up telephone access? J1 POTS SONET MPLS T1

POTS Explanation: POTS stands for plain old telephone service. It is simply the wiring used for analog phone systems. Existing wires use only one twisted pair. Analog signals are used through the local loop, while the long-distance network typically uses digital signaling over fiber optic. T1 and J1 are designations that identify a WAN line's bandwidth. SONET is a standard for networking over an optical medium. SONET is classified as a transport protocol because it can carry other types of traffic, such as ATM, Ethernet, and IP. Most PSTN networks use SONET within the long-distance portion of the network. MPLS is a WAN technology that adds labels to packets. Labels are used for switching packets and data prioritization.

Which of the following terms identifies the network of dial-up telephone and long-distance lines? ISDN PSTN VoIP Frame relay

PSTN Explanation: The public switched telephone network (PSTN) is the network used for placing local and long-distance phone calls. The local loop uses analog signals over POTS (regular telephone cable wires). The long-distance network typically uses digital signaling over fiber optic (typically using SONET). Integrated services digital network (ISDN) is a WAN technology that provides increased bandwidth within the local loop. Frame relay is a protocol used to connect to a WAN over dedicated (leased) lines. Voice over IP (VoIP) is a method for carrying phone calls over an IP-based network.

Which form of virtualization does not virtualize the hardware? Partial virtualization Full virtualization Hypervisor Paravirtualization

Paravirtualization Explanation: In paravirtualization, the hardware is not virtualized. In partial virtualization, only some of the components of the virtual machine are virtualized. In full virtualization, the virtual machine completely simulates a real physical host. This allows most operating systems and applications to run within the virtual machine without being modified in any way. This is the most common type of virtualization in use. A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware.

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? Full mesh Bus Star Partial mesh

Partial mesh Explanation: In a partial mesh topology, only some redundant paths exist. A partial mesh topology is more practical and less expensive than a full mesh topology. In a full mesh topology, every device has a point-to-point connection with every other device. This provides full redundancy, but it's expensive and impractical. A star topology connects network devices to the network with a single patch cable. A patch cable failure makes the connected device unavailable. A bus topology has a single point of failure. If there's a break in the network media, the network becomes unavailable.

You've implemented a network where each device provides all other devices on the network with access to shared files. Which type of network do you have? Multiple access Client-server Peer-to-peer Polling

Peer-to-peer Explanation: In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts, and each host is in charge of controlling access to those resources. In a client/server network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources. Polling is a media access method where a single device grants permission to other devices to access the network. Multiple access describes a media access method where each device determines when the medium is free.

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the right can be used more than once. Presentation layer Network, Application, Internetwork, Transport Data Link layer Application layer Session layer Network layer Transport layer

Presentation layer = Application Data Link layer = Network Application layer = Application Session layer = Application Session layer = Application Network layer = Internetwork Transport layer = Transport Explanation: The TCP/IP model maps to the OSI model as follows: The Application layer corresponds to the OSI model's Session, Presentation, and Application layers. The Transport layer matches the OSI model's Transport layer. The Internetwork layer is comparable to the OSI model's Network layer. The Network layer (sometimes called the Link layer) corresponds to the OSI model's Physical and Data Link layers.

Which term does the OSI model use that's different from the TCP/IP model in reference to the terms frame, packet, and segment? Protocol data unit (PDU) Session Presentation HTTP

Protocol data unit (PDU) Explanation: The OSI model uses the term protocol data unit (PDU) instead of the terms frame, packet, and segment. The Presentation and Session layers are Layers 5 and 6 of the OSI model, respectively, and do not correspond to the use of frame, packet, and segment in the TCP/IP model. HyperText Transfer Protocol (HTTP) is the protocol in the Application layer that supports web requests.

Which hardware components are controlled by the hypervisor? Storage, CPU, GPU CPU, storage, power supply RAM, power supply, motherboard RAM, CPU, storage

RAM, CPU, storage Explanation: RAM, CPU, and storage are controlled by the hypervisor. These are the three components that all VMs share. The power supply and motherboard are not controlled by the hypervisor. The GPU is only for direct usage by the host machine.

In the OSI model, what is the primary function of the Network layer? Route messages between networks. Transmit data frames. Enable communication between network clients and services. Ensure that packets are delivered with no loss or duplication.

Route messages between networks. Explanation: The Network layer is responsible for routing messages between networks. The Transport layer provides a transition between the upper and lower layers of the OSI model. The Data Link layer defines how to verify that data received from the Physical layer is error free (using parity and cyclic redundancy check [CRC]).

Which of the following internet services provides equal upload and download bandwidth? VDSL VHDSL ADSL SDSL

SDSL Explanation: Symmetrical DSL (SDSL) provides equal download and upload speeds. Depending on the region, speeds are between 1.544 to 2.048 Mbps. Newer SHDSL provides between 4.6 to 5.696 Mbps. The entire line is used for data, and simultaneous voice and data is not supported. Splitters are not required because voice traffic does not exist on the line. Asymmetrical DSL (ADSL) and very high DSL (VDSL or VHDSL) provide different download and upload speeds.

TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back? SYN/RST SYN/ACK ACK RST

SYN/ACK Explanation: If Computer 1 sends a SYN packet to Computer 2, Computer 2 receives the packet and sends a SYN/ACK packet to Computer 1. Computer 1 receives the SYN/ACK packet and replies back with an ACK packet, and the connection is complete. A SYN flag is used to start a connection between hosts. An ACK acknowledges the receipt of a packet. An RST resets a connection.

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patients' statistical data to a central database via the internet that ensures network connectivity for any clinic located anywhere in the world, even remote areas? Cable modem DSL Dial-up ISDN Satellite

Satellite Explanation: Satellite capability is available even in areas that do not have a local network infrastructure. Satellite requires a local portable transmitter with an antenna directed skyward to a satellite. Satellite service providers offer nearly 100% global network coverage by maintaining a series of satellites circling the earth in geosynchronous orbit. Dial-up, ISDN, and cable modems require a local network infrastructure provided by either the telephone company or cable television company.

During TCP/IP communication between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. Packets Transport layer Segments Network layer Bits Data Link layer Frames Physical layer

Segments = Transport layer Packets = Network layer Frames = Data Link layer Bits = Physical layer Explanation: Encapsulation is the process of breaking a message into packets, adding controls and other information, and transmitting the message through the transmission media. The following is the five-step data encapsulation/decapsulation process used by the OSI model: Upper layers prepare the data to be sent through the network. The Transport layer breaks the data into pieces called segments, adding sequencing and control information. The Network layer converts the segments into packets, adding logical network and device addresses. The Data Link layer converts packets into frames, adding physical device addressing information. The Physical layer converts the frames into bits for transmission across the transmission media.

Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet isn't working properly. Which of the following allows the service provider to remotely test the local loop? Demarc extension Horizontal cross connect Demarc Smartjack

Smartjack Explanation: A smartjack is a special loopback plug installed at a WAN service's demarcation point. Technicians at the central office can send diagnostic commands to the plug to test connectivity between the central office and the demarc. The demarcation point (demarc) is the line that marks the boundary between telco equipment and the private network or telephone system. A demarc extension extends the demarcation point from its original location to another location within the building. A horizontal cross connect connects wiring closets on the same floor.

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? Mesh Ring Star Bus

Star Explanation: A switch creates a network with a physical star topology. The physical star topology uses a logical bus topology and sends messages to all the devices connected to the hub. A mesh topology is a series of point-to-point links between devices. A ring topology uses a central device called an MSAU. A bus topology connects all devices to a trunk cable.

Which of the following topologies connects each network device to a central hub? Mesh Star Ring Bus

Star Explanation: Star topologies connect each device on a network to a central hub. In ring topologies, each device connects to a neighboring device so that a ring is formed. A bus topology connects all devices to a trunk cable. A mesh topology exists when there are multiple paths between any two nodes on a network.

Which resource is nearly impossible to decrease once allocated in virtualization? Storage NIC CPU RAM

Storage Explanation: You must destroy a VM to recover any over-provisioned storage space. You can raise or lower RAM or the CPU at any time with virtualization. You can disconnect a NIC at any time with virtualization.

Which of the following are characteristics of VDSL? (Select two.) Unequal download and upload speeds Supports only data (not voice) Equal download and upload speeds Does not require splitters Supports both data and voice at the same time

Supports both data and voice at the same time Unequal download and upload speeds Explanation: Very high DSL (VDSL or VHDSL) is similar to asymmetrical DSL, but has higher speeds. Speeds can be up to 52 Mbps downstream and 12 to 16 Mbps upstream, depending on the distance. Newer VDSL2 provides up to 100 Mbps at a distance of 300 meters. Because both voice and digital data are supported on the same line at the same time, splitters are required. Symmetrical DSL (SDSL) provides equal download and upload speeds. The entire line is used for data, so simultaneous voice and data is not supported. Splitters are not required because voice traffic does not exist on the line.

Which of the following is a characteristic of SDSL? Supports data traffic only (no voice) Requires splitters on the line Unequal download and upload speeds Speeds up to 100 Mbps

Supports data traffic only (no voice) Explanation: Symmetrical DSL (SDSL) has the following features: The entire line is used for data, making simultaneous voice and data transmission impossible. Speeds between 1.544 to 2.048 Mbps are possible. Upload and download speeds are equal. Line splitters are not required because voice traffic is not on the line. ADSL and VDSL have unequal upload and download speeds. Both support simultaneous voice and data traffic, so splitters are required. VDSL supports speeds up to 100 Mbps.

What connectivity device should be used when wanting to avoid collisions? Hub Router Switch Bridge

Switch

Which OSI model layer is responsible for guaranteeing reliable message delivery? Transport Application Session Data Link

Transport Explanation: The Transport layer is responsible for connection services that provide reliable message delivery through error detection and correction mechanisms. Specifically, the TCP protocol provides these services. The Application layer integrates network functionality into the host operating system and enables network services. The Session layer's primary function is to manage the sessions in which data is transferred. The Data Link layer defines rules and procedures for hosts as they access the Physical layer.

Drag the information type on the left to the appropriate layer of the TCP/IP model it's associated with on the right. Transport layer Link layer Application layer Internet layer Segments Frames Data Packets

Transport layer = Segments Link layer = Frames Application layer = Data Internet layer = Packets Explanation: Encapsulation is the process of breaking a message into packets, adding controls and other information, and transmitting the message through the transmission media. You need to know the following four-step data encapsulation process on the sending system using the TCP/IP model: The Application layer prepares the data to be sent through the network. The Transport layer breaks the data into pieces called segments, adding sequencing and control information. The Internet layer converts the segments into packets, adding logical network and device addresses. The Link layer converts the packets into frames, adding physical device addressing information. It also converts the frames into bits for transmission across the transmission media.

How many types of full virtualization are there? One Three Two Four

Two Explanation: They are called software assisted and hardware assisted.

Which of the following BEST describes an enterprise-level hypervisor? Type 1 VHD VM Type 2

Type 1 Explanation: Type 1, or bare metal, is a hypervisor that is installed on enterprise-level servers. Type 2 is a hypervisor that is installed on a PC or laptop and used on a small scale. VHD is a virtual hard disk and is used for some virtual machines. It is not a hypervisor. A VM is a virtual machine. This is what a hypervisor manages.

You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? Network as a Service (NaaS) Virtual networks Virtual servers Virtual desktops

Virtual servers Explanation: Server virtualization runs multiple instances of a server operating system on a single physical computer. With server virtualization, you can migrate servers on older hardware to newer computers or add virtual servers to computers with extra, unused hardware resources. Virtual desktops do not provide DHCP services. Virtual networks allow virtual servers and desktops to communicate with each other, and they can also allow communication with network devices out on the physical network via the host operating system. Network as a Service (NaaS) servers and desktops are virtualized and managed by a contracted third party.


Set pelajaran terkait

trénink z obchodního práva - ZOK

View Set

Chapter 6 - Project Schedule Management

View Set

Scoring of Sleep & Associated Events (AASM Guidelines)

View Set

Psychology Chapter 1: Introduction to Psychology

View Set