IST Chapter 1,2,3 Test

Ace your homework & exams now with Quizwiz!

True

UDP port 123 is utilized by the Network Time Protocol service.

Physical Layer

The lowest, or first, layer of the OSI model. Protocols in this layer generate and detect signals so as to transmit and receive data over a network medium. These protocols also set the data transmission rate and monitor data error rates, but do not provide error correction.

False

The protocol data unit for the Physical layer of the OSI model is payload, or data.

Application Layer

The seventh layer of the OSI model. This layer's protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.

Presentation Layer

The sixth layer of the OSI model. Protocols in the Presentation layer translate between the application and the network. Here, data are formatted in a schema that the network can understand, with the format varying according to the type of network used. The Presentation layer also manages data encryption and decryption, such as the scrambling of system passwords.

Data Link layer Physical layer

A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?

Peer-to-peer

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?

Star

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star-bus

A network consists of three switches connected together by a network cable. Three computers are connected to the each of the three switches. Which network topology is being used?

Entrance facility

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?

Look at whether the device is located on the ISP's side of the demarc.

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

False

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

File Transfer Protocol

An encrypted and secure file transfer protocol is SFTP which is based on

Datalink Layer

Anything that works with a MAC address works at this layer such as network cards and switches.

Physical address MAC address hardware address Data Link layer address

At the Data Link layer, which type of network address is used to identify the receiving node?

Segment

At the transport layer , the PDU is known when the TCP protocol is used

datagram

At the transport layer , the PDU is when the UDP protocol is used

Layer 2

Data Link

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

21

FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port does an FTP server listen on?

Layer 7

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

128

How many bits does an IPv6 address contain?

6

How tall are standard(full) racks? _____________feet

ipconfig /release

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

Rack ears

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

False

In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack.

No more than four times the diameter of the cable.

In general, how much can a twisted-pair's cable be bent before data transmission may be impeded?

at least 3 feet

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?

HTTP

In the client-server model, what is the primary protocol used for communication between a browser and web server?

burned

PVC cable coating is toxic when

False

Static electricity is an electrical charge in motion.

All devices on your local network

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

3389

Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default?

False

The 1024 - 65535 range of ports is also known as the "well-known" range.

False

The Data Link layer attaches a trailer to the end of a packet, and does not include a header.

True

The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.

False

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol.

False

The Transport layer header addresses a receiving application by a number called a MAC address.

Session Layer

The fifth layer in the OSI model. This layer establishes and maintains communication between two nodes on the network. It can be considered the "traffic cop" for network communications.

Transport Layer

The fourth layer of the OSI model. In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. this layer services include flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing.

True

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

Network Layer

The third layer in the OSI model. Protocols in this layer translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver.

MDF

There is only one ________) per network, but there can be many

ipconfig /all

What command can you utilize to display TCP/IP configuration information for each network adapter installed?

vertical cross connect

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?

255

What decimal number corresponds to the binary number 11111111?

The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

What does backbone cabling consist of?

RG-6 Coaxial

What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling?

Segment Transport layer

What is a message called that is delivered by TCP? At which layer does the protocol work?

42

What is the Industry Standard (full rack )unit of measurement that defines the space available in a rack?

List all components on the network.

What is the first step of inventory management?

169.254.0.1 through 169.254.255.254

What is the range of addresses that might be assigned by APIPA?

TIA/EIA-568

What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?

A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

What statement accurately describes what a cable bend radius determines?

Wiring schematic

What type of diagram shows a graphical representation of a network's wired infrastructure?

punchdown tool

What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block?

HTTP

When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:80. Which Application layer protocol is in use for this session?

FE80::/10

When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?

Remote Desktop

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?

Root servers

Which computers are the highest authorities in the Domain Name System hierarchy?

VoIP gateway

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

POP3

Which email protocol allows an email client to download email messages to the local computer?

IMAP4

Which email protocol allows an email client to read mail stored on the mail server?

Client-server

Which networking model requires that a computer is available with a Network Operating System installed on it?

Routers Switches KVM switch

Which of the following devices are you likely to find in the MDF?

dig

Which of these commands is available only in Linux?

A password manager

Which of these is considered a secure place to store a list of documented network passwords?

MX record

Which type of DNS record identifies an email server?

Port

Which type of address is used at the Transport layer to identify the receiving application?

nslookup

While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?

dallas.mycompany.com

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

One

You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?

The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

ifconfig -a

You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?

POP3

You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol handles your transmission?

Patch cable

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

Zenmap Command Prompt PowerShell

You've decided to run an Nmap scan on your network. What app could you open to perform this task?

Layer 7

application

IDF

connecting internal portions of the network

Active Directory

name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?

Layer 3

network

Layer 1

physical

Layer 6

presentation

plenum

rated cabling in the area above the ceiling tile

Internet Layer

responsible for addressing, packaging, and routing messages on the Internet

Layer 5

session

Layer 4

transport


Related study sets

Security+ SY0-501 Exam Prep (Packt PDF)

View Set

final exam - Georgia Life and Health 2

View Set

CHAPTER 9 Peripheral and Autonomic Nervous System ANSWERS

View Set

Strategic Management Practice Questions

View Set

Test 2: Perception, Sensation and Memory

View Set

Business Law- Chapter 28- Checks and Banking in Digital Age

View Set