Network+ Ch1 quiz updated

Ace your homework & exams now with Quizwiz!

Which of the following is an example of encapsulation? a. The addition of a header to data inherited from the layer above in the OSI model. b. The subtraction of a header from data inherited from the layer below in the OSI model. c. The modification of headers from a higher layer in the OSI model. d. The addition of a trailer to data inherited from the layer above in the OSI model.

A

Servers that have a NOS installed require less memory, processing power, and strorage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients. A. True B. False

B

Static electricity is an electrical charge in motion A. True B. False

B

The Data Link layer attaches a trailer to the end of a packet, and does not include a header. A. True B. False

B

The Transport layer header addresses a receiving application by a number called a MAC address.

B

The protocol data unit for the Physical layer of the OSI model is payload, or data.​ A. True B. False

B

The transmision control protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. A. True B. False

B

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node? A. MAC-address b. IP address c port address d. autonomous system address

B

What is the minimal amount of voltage required to damage an electrical component? a.5 volts b. 10 volts C.100 volts d. 1500 volts

B

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? a. File Transfer Protocol (FTP) b. Secure Sockets Layer (SSL) c. Secure Shell (SSH) d. Remote Desktop Protocol (RDP)

D

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? a. fail-open b. fail-close c. fail-tolerant d. fail-oriented

A

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established/ A. True B. False

A

At what layer of the OSI model does a network switch normally operate? a. Layer 2 b.Layer 3 c. Layer 4 d. Layer 5

A

In general, an API(application programming interface) call is the method an application uses when it makes a request of the OS. A. True B. False

A

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? a. MAC (Media Access Control) address B. DAC (Data Access Control) address c. DAC (Digital Access Control) address d. PAC (Packet Access Control) address

A

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belong to two or more local networks. A. True B. False

A

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed. A. True B. False

A

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a. fail-open b. fail-close c. fail-tolerant d. fail-dynamic

B

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a, bus topology b. star topology c. star bus topology d. mesh topology

B

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? a. The Presentation layer describes the interface between two applications, each on separate computers. b. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. c.The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application d. The Presentation layer is responsible for transporting Application layer payloads from one application to another.

B

The Data Link Layer utilizes what name for its protocol data unit (PDU)? a. packet b. data c. bit d. frame

D

8. What is a defining characteristic of a bus topology based network? a. Devices are connected to two adjacent devices, and communication priority is granted by a token. b. Devices are connected directly to a centralized networking device, known as a network switch. c. Devices are daisy-chained together in a single line. d. Devices are directly attached to a network router, which forwards data to intended destinations.

C

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Application b. Internet c. Transport d. Link

C

In the United States, who is able to activate the Emergency Alert System at the national level? a. Any U.S. state or territory b. The Federal Bureau of Investigation C. The President d. Local law enforcement

C

What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? a. HTTP b. POP3 C. SNMP d. SMTP

C

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? a. Application Layer b. Presentation Layer c. Session Layer d.Transport Layer

C

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? a. catastrophic failure b. interrupting failure c. upset failure d. temporary failure

C

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Application b. Session c. Transport d. Network

D

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? a. Layer 4 b. Layer 5 c. Layer 6 d. layer 7

D

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? a. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination. b. The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. c. The packet will be dropped silently, requiring the communicating application try again. d The packet will be divided into smaller packets using fragmentation.

D


Related study sets

First mover advantages and disadvantages

View Set

Ch 9 Video Case on Fast Food Discount Wars

View Set