CompTIA Network + Guide to Networks - Chapter 1 Review Questions

Ace your homework & exams now with Quizwiz!

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS

A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you begin troubleshooting? Which OSI layer is responsible for not dropping the Skype connection?

Session Layer, Application

At the Network layer, what is a message called?

packet

What is the fundamental distinction between a Layer 2 switch and a router?

A Layer 2 switch belongs only to its local network, and a router belongs to two or more

What is the fundamental distinction between a MAN and a WAN?

A MAN covers a small geographical area, and a WAN covers a large geographical area.

What is the fundamental distinction between a node and a host?

A host is a computer that hosts a resource on the network, and a node is any computer or device that can be addressed on the network.

Which email protocol allows an email client to read mail stored on the mail server? A. IMAP4 B. SMTP C. TCP D. POP3

A. IMAP4

Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A. Telnet B. Remote Desktop C. FTP D. SSH

A. Telnet

Apache is a popular example of what type of networking software? A. Web server B. Browser C. Email server D. Email client

A. Web server

What is the name of the domain controller database that Windows Server 2012 R2 uses to store data about user access and resources on the network?

Active Directory

A user complains that he cannot access a particular Web site, although he is able to access other Web sites. At which layer of the OSI model should you begin trouble- shooting the problem?

Application Layer

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? A. Telnet B. Remote Desktop C. FTP D. SSH

B. Remote Desktop

Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications? A. HTTP and HTTPS B. SSL and TLS C. SSL and HTTP D. TCP and UDP

B. SSL and TLS

In the client-server model, what is the primary protocol used for communication between a browser and Web server? A. FTP B. TCP C. HTTP D. SSL

C. HTTP

Which Session layer protocol is a streaming live video teleconference likely to use on the network? A. UDP B. SMTP C. RTP D. TCP

C. RTP

In Question 11, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support that it could not support without the upgrade?

Client-Server networking model

What service provided by Windows Server 2012 R2 allows a computer to serve up applications to other computers on the network? A. Remote Desktop Services B. Windows 8.1 C. File Transfer Protocol D. Active Directory

D. Active Directory

List three types of services a network might support that are considered part of unified communications or convergence. A. File transfers, print services, and conversational voice B. User authentication, streaming live audio and video, and print services C. Web services, email services, and file services D. Conversational voice, streaming live audio and voice, and streaming stored audio and voice

D. Conversational voice, streaming live audio and voice, and streaming stored audio and voice

Which email protocol allows an email client to download email messages to the local computer? A. IMAP4 B. SMTP C. TCP D. POP3

D. POP3

What is a PDU called at the Link layer?

Frames

At the Network layer, what type of address is used to identify the receiving host?

IPV4

Why is it important to wear an ESD strap when installing a server in a rack?

It's important to wear an ESD strap because it equalizes the electrical potentials between you and the server

At the Data Link layer, which type of network address is used to identify the receiving node?

MAC Address

Which of the following applications could be used to run a website from a server?

Ngnix

A network consists of 10 computers, all running Windows 7 Professional. One computer acts as a file server and serves up data to other computers on the network. Which networking model does the network use?

Peer-to-peer networking model

A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the net- work adapter work?

Physical Layer, Data Link Layer

Which type of address is used at the Transport layer to identify the receiving application?

Port number

What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work?

Segment; Datagram; Transport layer

A network consists of seven computers and a network printer all connected directly to one switch. Which network topology does this network use?

Star topology

In Question 14, suppose a new switch is connected to the first switch by way of a network cable and three computers are connected to the new switch. Which network topology is now used?

Star-Bus topology

What is the primary protocol used at the Network layer?

TCP/IP

Is TCP or UDP normally used when streaming live video? Why?

UDP, because guaranteed delivery is not as important as fast transmissions.


Related study sets

Linux Practice Questions and Quizzes

View Set

Chapter 1 Environmental Science: Understanding Our Environment

View Set

Early Intervention: Welcome to Baby Watch

View Set

Exam 2 - Strategic Management (MGMT 3013)

View Set

Micro Chapter 3 bacterial cell structure

View Set

Research Methods in Psychology - Q&A (PSYC 304)

View Set