Chapter 1-15 Quizzes

Ace your homework & exams now with Quizwiz!

A distance-vector routing protocol: is concerned with tracking the status and type of each link to which its router is connected. calculates a metric, via the use of Dijkstra's shortest path first (SPF) algorithm, that considers the status (state) of a link and its connection type, speed, and delay shares a logical imagery of the topology of its neighboring routers and itself so that every router has the exact same view of the internetwork. uses different metrics to determine the better path available.

uses different metrics to determine the better path available

When is a frame prepared for transmission on a local area network, wide area network, or the Internet? When the frame is addressed to a host on another network When the frame is addressed to a host on the same network After the frame has gone through a checksum process After the associated packet has been reassembled

when the frame is addressed to a host on another network

Arturo is a network engineer. He is troubleshooting a routing problem and wants to verify that the return packet is reaching the source. What should he do? Debug the Internet Control Message Protocol (ICMP) on the destination router. Run a show IP route command on the router. Debug the Internet Control Message Protocol (ICMP) on both source and destination routers. Use different routing metrics.

Debug the internet control message protocol (ICMP) on both source and destination routers

Which Application Layer threat occurs when an attacker consumes the resources on a target computer for things it was not intended to be doing, thus preventing normal use of network resources for legitimate purposes? Trojan horse Worm Ransomware Denial of service (DoS)

Denial of Service (DoS)

Which of the following converts fully qualified domain names (FQDNs) into numeric IP addresses or IP addresses into FQDNs? Hypertext Transfer Protocol (HTTP) Simple Network Management Protocol (SNMP) Simple Mail Transfer Protocol (SMTP) Domain Name System (DNS)

Domain Name System

Which of the following protocols is nonroutable? Dynamic Host Configuration Protocol Open Shortest Path First Enhanced IGRP Border Gateway Protocol

Dynamic Host Configuration Protocol (DHCP)

Which routing metric indicates the number of intermediary routers a packet will have to pass through to reach a destination network? Bandwidth Hop count Load Cost

Hop Count

Which of the following is a Transmission Control Protocol (TCP) service that uses a request-response protocol in which a client sends a request and a server sends a response? Simple Mail Transfer Protocol (SMTP) File Transfer Protocol (FTP) Hypertext Transfer Protocol (HTTP) Domain Name System (DNS)

Hypertext Transfer Protocol (HTTP)

A common Internet Protocol version 4 (IPv4) routing protocol is: RIPng. Intermediate System-to-Intermediate System (IS-IS). Open Shortest Path First (OSPFv3). Multiprotocol BGP (MP-BGP).

Intermediate System-to-Intermediate System (IS-IS)

A common OSI Layer 6 protocol is: Remote Procedure Call (RPC). Internet Message Access Protocol (IMAP). Dynamic Host Configuration Protocol (DHCP). Simple Mail Transfer Protocol (SMTP).

Internet Message Access Protocol (IMAP)

The core protocol of the OSI Network Layer is: Transmission Control Protocol (TCP). Internet Protocol (IP). Open Shortest Path First (OSPF). Border Gateway Protocol (BGP).

Internet Protocol (IP)

What OSI Network Layer functionality moves data across a series of interconnected networks? Datagram/packet encapsulation Error handling and diagnostics Fragmentation and reassembly Internetwork routing

Internetwork routing

Which routing metric is the amount of bandwidth in use on the link? Delay Hop count Load Cost

Load

Which Layer 2 header field contains the 6-byte source and destination addresses that the Ethernet frame is sending to and from? MAC address Protocol Type field DSAP/SSAP field SNAP field

MAC address

The Spanning Tree Protocol (STP) configuration process has several steps. Each step refines the spanning tree to determine the best path through the network. Which of the following is not an STP configuration step? Identify the root bridge. Identify the root port (RP). Elect designated ports. Open other ports.

Open other ports

Which application architecture works well for situations in which contention for data is low, clients rely primarily on their local resources, and clients share only what they need to get a task accomplished? Host-based Client/server Cloud computing/N-tier Peer-to-peer

Peer-to-peer

Which IEEE 802.1Q VLAN header field refers to class of service? Tag Protocol Identifier (TPID) Tag Control Information (TCI) Priority Code Point (PCP) Drop Eligible Indicator (DEI)

Priority Code Point (PCP)

A common OSI Layer 5 protocol is: Remote Procedure Call (RPC). Transport Layer Security (TLS). Secure Shell (SSH). Dynamic Host Configuration Protocol (DHCP).

Remote Procedure Call (RPC)

Which Layer 2 header field has a 3-byte organizationally unique identifier (OUI) used to identify the network interface controller (NIC) manufacturer and includes the 2-byte Protocol Type field? MAC address Protocol Type field DSAP/SSAP field SNAP field

SNAP field

Which Application Layer threat is typically disguised as a useful program to trick the user into downloading it? Botnet Denial of service (DoS) Trojan horse Worm

Trojan Horse

True or False? A collision domain is a physical Ethernet network. True False

True

True or False? A fault-tolerant Internet connectivity solution may include a more expensive high-speed Internet access link supported by a less expensive secondary Internet access link. True False

True

True or False? A host-based application architecture represents a single point of failure. True False

True

True or False? A peer-to-peer application architecture is fault tolerant. True False

True

True or False? A port is a number that tells a server what type of service the client is requesting. True False

True

True or False? A spanning tree that maps to one or more virtual LANs (VLANs) is called a multiple spanning tree (MST). True False

True

True or False? A virtual LAN (VLAN) enables certain types of traffic to be isolated to their own collection of ports. True False

True

True or False? A virtual LAN (VLAN) provides the ability to segregate network traffic and increase performance. True False

True

True or False? ARPANET was the basis for today's Internet. True False

True

True or False? An Internet router that includes a firewall and a Layer 2 switch of local ports is sufficient for many small office/home office environments. True False

True

True or False? An enterprise network that spans multiple buildings may connect at the central data center to create a campus collapsed backbone. True False

True

True or False? An instance of a service listening for traffic on a specific port is called a socket. True False

True

True or False? Cable companies use Trivial File Transfer Protocol (TFTP) to configure cable modems. True False

True

True or False? Cloud computing makes it possible for organizations of any size to lease data center infrastructure and implement an N-tier architecture. True False

True

True or False? Clustering, or stacking LAN switches, groups switches together in the wiring closet. True False

True

True or False? Depending on whether unshielded twisted-pair, shielded twisted-pair, or optical fiber is used, distance limitations define a physical Ethernet collision domain. True False

True

True or False? Ethernet LANs are commonly deployed as a series of connected star-wired networks. True False

True

True or False? Link aggregation allows switches to communicate along several physical links in parallel. True False

True

True or False? Network resiliency is the ability of the network to maintain availability and network connectivity. True False

True

True or False? Network wiring can be centralized in a wiring closet. True False

True

True or False? One of the most common failures in a network is the medium itself. True False

True

True or False? Spanning Tree Protocol (STP) prevents switching loops by enabling switches (or bridges) to exchange information about detected paths in the network. True False

True

True or False? Telnet sends data in the clear, which makes it easy for an attacker with a sniffer to see everything that is typed, including passwords. True False

True

True or False? The Presentation Layer of the OSI model converts data into standard formats, such as American Standard Code for Information Interchange (ASCII), for application program use. True False

True

True or False? The Session Layer (OSI Layer 5) is the first layer that connects packets together into conversations. True False

True

True or False? The term "3-tier architecture" refers to the separate tiers represented by the client, appServer, and database server. True False

True

True or False? The user interface is where front-end software interfaces with a computer user. True False

True

True or False? When a web browser initiates a connection, it sends an HTTP request to a web server. True False

True

Maria is a network analyst for an enterprise. She is creating guidelines for network personnel to apply to business issues that may need a new software application to resolve. Which of the following is the best overall approach? Adopt a technical solution and then decide how to apply it to the business problem. Identify a business problem, and then choose an application architecture. Understand the business problem, identify a business solution, and then identify a technical solution. Identify a technical problem, and then determine which business issues it might affect.

Understand the business problem, identify a business solution, and then identify a technical solution.

A new or improved physical media solution must meet certain requirements to be an attractive option and to be adopted by the marketplace. Which of the following requirements is most affected by interference in the environment? Availability Usability Affordability Installability

Usability

All of the following devices can be powered by Power over Ethernet (PoE) switch ports, except: Voice over Internet Protocol (VoIP) phones. wireless access points. analog wall clocks. lighting controls.

analog wall clocks

The HTTP request and response process is required for: Domain Name System (DNS) to convert fully qualified domain names (FQDNs) into numeric IP addresses. communications between a web browser and a web server. file exchanges between peer-to-peer applications. Telnet to establish a session with a host at another site.

communications between a web browser and a web server

The Presentation Layer of the OSI model: is the software entry point for sending messages to and from an application's users. serves as the primary interface for application software to interact with networks. sets up, manages, and terminates connections between applications on source and destination computers. correct on the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network.

correct on the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network.

Susan is a network engineer for a marketing firm with 80 staff members. Ten employees are designers who work with high-resolution media files and streaming video content daily. Their content decreases performance of the overall network. What is the best solution to improve network performance for general users? Create a virtual LAN (VLAN) for the general users. Create a wide area network (WAN) connection for the designers. Create a virtual LAN (VLAN) using dynamic membership for the designers. Shift the designers to a separate network with a bus topology.

create a virtual (VLAN) using dynamic membership for the designers

The primary purpose of routers is to: encapsulate packets before sending them to their destinations. format packet headers. receive datagrams from higher levels that will later be sent to lower levels. determine which of its connections are best to use for a packet to reach its destination most efficiently.

determine which of its connections are best to use for a packet to reach its destination most efficiently

There are two kinds of Layer 2 switches: cut-through and store-and-forward. A store-and-forward Layer 2 switch: examines the entire frame, stores it in memory, makes a forwarding decision based on the destination Media Access Control (MAC) layer address and the port or interface associated with that address, and performs a checksum validation. examines the destination Media Access Control (MAC) address and makes a forwarding decision based on the port or interface associated with that address; it does not perform error checking. can forward frames faster with higher speeds. makes forwarding and filtering decisions based on the destination MAC layer address.

examines the entire frame, stores it in memory, makes a forwarding decision based on the destination MAC layer address and the port or interface associated with that address, and performs a checksum validation.

True or False? With Spanning Tree Protocol (STP), the root port on the switch that leads to the root bridge has the highest root path cost. True False

false

All of the following are true of fault tolerance, except: fault tolerance is similar to redundancy and resiliency. fault tolerance pertains to an outage or a failure that a network can sustain without eliminating availability completely. an automatic switchover solution such as a backup power supply is an example of a fault-tolerance solution. full redundancy is inexpensive.

full redundancy is inexpensive

Software applications all began as: host-based architectures. client/server architectures. cloud computing architectures. peer-to-peer architectures.

host-based architectures

All of the following are true of Internet Protocol (IP), except: to send messages using IP, higher-layer data must be encapsulated into IP datagrams. it allows routers to determine which routes are available and which is the most efficient to a destination. encapsulated datagrams are sent to the Data Link Layer, where they are further encapsulated into frames. on the Network Layer, IP puts Transport Layer messages, including the headers and trailers of all higher layers, into the data field of an IP datagram.

it allows routers to determine which routes are available and which is the most efficient to a destination

What combines multiple physical links so they can be used as a single logical link? Redundancy Link filtering Virtual LAN (VLAN) tagging Link aggregation

link aggregation

All of the following are other terms for link aggregation, except: link bundling. port trunking. link isolation. NIC teaming.

link isolation

Each entry in a routing table specifies one particular: advertisement. MAC address. path. frame.

path

A routed protocol: prescribes the formatting of data being transported across networks. allows routers to determine which routes are available and which is the most efficient to a destination. includes Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). is the language that routers use to communicate.

prescribes the formatting of data being transported across networks

The Application Layer of the OSI model: can provide different modes of communicating, such as full duplex, half duplex, and simplex. serves as the primary interface for application software to interact with networks. sets up, manages, and terminates connections between applications on source and destination computers. on the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network.

serves as the primary interface for application software to interact with networks.

The Session Layer of the OSI model: is the software entry point for sending messages to and from an application's users. serves as the primary interface for application software to interact with networks. correct sets up, manages, and terminates connections between applications on source and destination computers. on the sending computer, is responsible for formatting and coding high-level data that comes from applications into a form that is acceptable for transmitting on the network.

sets up, manages and terminates connections between applications on source and destination computers.

All of the following are common network resiliency methods, except: single connections between critical nodes. redundant critical devices. quality of service monitoring to react to service slowdowns. redirection to avoid congestion.

single connections between critical nodes

What type of organization would benefit from departmental LANs using virtual LANs (VLANs) and a collapsed backbone topology? Small office/home office (SOHO) only Small office/home office (SOHO) and small and medium-sized business (SMB) Small and medium-sized business (SMB) and enterprise Enterprise only

small and medium sized business (SMB) and enterprise

A __________ is a connection between two switches that transports traffic between the switches. The ports used within the same virtual LAN (VLAN) are called __________. When physical ports are no longer part of that VLAN, the reverse configuration is called __________. tag, tagging links, untagging links port link, spanning ports, unspanned ports tag link, ephemeral ports, static ports tag link, tagging ports, untagging ports

tag link, tagging ports, untagging ports

Wen is a network engineer. He is setting up a LAN. He knows that each network connection must adhere to the distance limitations of the wiring as well as the signaling of the network interface controller (NIC), hub, or Layer 2 switch. What step should he take first? Switch from unshielded twisted-pair to shielded twisted-pair cabling. Use only devices that support Power over Ethernet (PoE). Replace the cabling wiring entirely. Test and certify the wiring system.

test and certify the wiring system

Which of the following is not true of switching and collision domains? A Layer 2 switch separates LANs into multiple collision domains. The fewer nodes on an Ethernet collision domain, the greater the chance of a collision occurring. A hub acts as a single Ethernet collision domain. A Layer 2 switch forwards traffic to only a single port that has the destination address associated to that port.

the fewer nodes on an Ethernet collision domain, the greater the chance of a collision occurring

Regarding application architectures, the core function of processing logic is: data storage. data access. to carry out computations on application data. to get data from and presenting data to end users.

to carry out computations on application data

What is the purpose of Rapid Spanning Tree Protocol (RSTP)? To assign virtual LANs (VLANs) to an instance of a multiple spanning tree To prevent spanning tree calculations from occurring automatically To make spanning tree convergence faster To more quickly create switching loops

to make spanning tree convergence faster

All of the following are true of local area networks (LANs), except: a LAN is the means for interconnecting devices. a LAN cannot operate completely on Layer 2 (the Data Link Layer). Layer 2 works closely with Layer 1 to transport frames around a LAN. most of the technological advancements in Layer 2 are directly related to Layer 1 advances or differences.

A LAN cannot operate completely on Layer 2 (the Data Link Layer)

When designing Ethernet network redundancy, what can minimize the length of a network outage if a fiber optic backbone cable is cut? Alternate paths Redundant hardware and power supplies A backup network link Quality of service monitoring

A backup network link

Which routing metric is a relative indication of how trustworthy a particular route is? Delay Administrative distance Load Reliability

Administrative distance

Which of the following routes messages outside of an autonomous system (AS) or between two networks? An exterior routing protocol An interior routing protocol A routed protocol None; it's not possible to route outside of an AS.

An exterior routing protocol

The layer of the OSI model that interacts with a human rather than another technological element is: Application. Presentation. Network. Physical.

Application

Carl is a network engineer. He is hardening a server to make it less vulnerable to attacks. What is the most secure method of handling open ports? Memorize each port and decide whether or not to block it. Apply the deny-all principle and enable only those ports that are needed. Leave all ports open. Close all ports and open them only when needed.

Apply the deny-all principle and enable only those ports that are needed.

Which application architecture leverages workstation processing, balances network I/O, and separates processing functions from data? Host-based Client/server Cloud computing/N-tier Peer-to-peer

Client/server

In which application architecture was the application server (appServer) introduced? Host-based Client/server Cloud computing/N-tier Peer-to-peer

Cloud Computing/N-tier

What OSI Network Layer functionality breaks up a packet into fragments that must fit within the maximum transmission unit (MTU) size of the Data Link Layer frame format? Datagram/packet encapsulation Error handling and diagnostics Fragmentation and reassembly Internetwork routing

Fragmentation and reassembly

Layer 2 networks operate at the Data Link Layer. They examine and make forwarding or filtering decisions based on information in a protocol data unit (PDU). Where are PDUs located? MAC address table Routing table Access control list (ACL) Data Link header

Data Link header

Susan is a network engineer in charge of a medium-sized enterprise network. It is a single-vendor network with all devices from Cisco. Which of the following protocols is most likely in use? Open Shortest Path First (OSPF) Enhanced Interior Gateway Routing Protocol (EIGRP) Routing Information Protocol (RIP) Border Gateway Protocol (BGP)

Enhanced Interior Gateway Routing (EIGRP)

True or False? A drawback of virtual LANs (VLANs) is that they increase network congestion and collisions. True False

False

True or False? An all broadcast destination address of EE-EE-EE-EE-EE-EE sends Ethernet frames out all ports or interfaces on a bridge. True False

False

True or False? Botnets are closely associated with ransomware attacks. True False

False

True or False? In half-duplex mode, both ends of a connection can communicate simultaneously. True False

False

True or False? Regarding HTTP requests, POST is the most common initial request to retrieve and render a resource (webpage). True False

False

True or False? Session Initiation Protocol (SIP) is used to move files from one computer to another. True False

False

True or False? Switch port security is a software feature in some switches that monitors traffic and disables the RJ-45 port if that port is the source of unwanted broadcast transmissions. True False

False

True or False? The Application Layer of the OSI model got its name from its main purpose of making received data presentable to the Presentation Layer. True False

False

True or False? The process of forwarding traffic within a virtual LAN (VLAN) from one switch to another is called VLAN stacking. True False

False

True or False? Webpages are formatted in Hypertext Transport Protocol (HTTP). True False

False

True or False? What the OSI model calls an "application" refers to a user application, such as a web browser. True False

False

A common OSI Layer 7 protocol is: Transport Layer Security (TLS). Secure Shell (SSH). Layer 2 Tunneling Protocol (L2TP). Session Initiation Protocol (SIP).

Session Initiation Protocol (SIP)

Which of the following is a User Datagram Protocol (UDP) service for sharing and collecting information about network devices? Domain Name System (DNS) Simple Network Management Protocol (SNMP) Trivial File Transfer Protocol (TFTP) File Transfer Protocol (FTP)

Simple Network Management Protocol (SNMP)

Distance-vector routing protocols employ a variety of timers and mechanisms. Which of the following prevents routing loops by ensuring that the information about the routing for a particular packet is never sent back in the direction from which it's received? Hold-down timer Invalid timer Flush timer Split horizon

Split horizon

How does virtualization of routers and their switching functionality support Layer 3 resiliency? Provides high availability Creates an alternate path in the event of a cable cut Supports collapsed backbones and internetworking between LANs Is needed for electrical outages or failure of the primary electrical source

Supports collapsed backbones and internetworking between LANs

What is routing convergence? Forwarding of traffic to a particular destination address that has two or more paths for use Examination of the IP packet header and Transport Layer packet headers to make additional forwarding or filtering decisions Synchronization of the routing tables of directly connected devices Another term for packet filtering

Synchronization of the routing tables of directly connected devices


Related study sets

AS 221 Instrument Pilot - Stage 1 Exam Questions

View Set

Psych chapter 9, 10, 11, 12 quizzes

View Set

Chapter 4,5,6,7 Natural Disasters

View Set

Renal Pathophysiology Practice Questions with Rationales

View Set