Network+ Chapter 1

Ace your homework & exams now with Quizwiz!

video teleconference (VTC)

A __________ application, such as Skype or Google Talk, allows people to communicate in video and voice, primarily using the point-to-point model.

material safety data sheet (MSDS)

A __________ explains how to properly handle substances such as chemical solvents and how to dispose of them.

catastrophic

A __________ failure destroys the component beyond use.

Client Server Application

A __________ involves two computers. The first, a client computer, requests data or a service from the second computer, called the server.

router

A __________ is a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.

remote application

A __________ is an application that is installed and executed on a server and is presented to a user working at a client computer.

switch

A ___________receives incoming data from one of its ports and redirects (switches) it to another port or multiple ports that will send the data to its intended destination(s).

topology

A __________describes how the parts of a whole work together.

FTP (File Transfer Protocol).

A client-server application that transfers files between two computers. __________ does not provide encryption and is, therefore, not secure.

file server

A computer that provides file services is called a __________, and serves up data to users, in contrast to users keeping copies of the data on their workstations.

True

A four-layer model similar to the OSI model is the TCP/IP model. Using the TCP/IP model, the Application, Presentation, and Session layers are wrapped together and called the Application layer. The Physical layer is so simple, it's ignored, which makes for four layers: Application layer, Transport layer, Internet layer (the Network layer in the OSI model), and Network Interface layer (the Data Link layer in the OSI model).

WAN (Wide Area Network)

A group of LANs that spread over a wide geographical area is called a __________.

Network

A group of computers and other devices (such as printers) that are connected by some type of transmission media.

MAN(Metropolitan Area Network)

A group of connected LANs in the same geographical area—for example, a handful of government offices surrounding a state capitol building—is known as a __________.

Star Topology

A network consists of seven computers and a network printer all connected directly to one switch. Which network topology does this network use?

OSI (Open Systems Interconnection) reference model

A seven-layer model developed by the International Organization for Standardization to categorize the layers of communication.

star topology

A topology in which all devices are connected to one central device.

upset

An __________ failure can shorten the life of a component and/or cause intermittent errors.

Web server

Apache is a popular example of what type of networking software?

Packet

At the Network layer, what is a message called?

IP address

At the Network layer, what type of address is used to identify the receiving host?

Payload

Data that is passed between applications or utility programs and the operating system is called a __________and includes control information.

Protocol Data Unit (PDU)

Different names for a group of bits as it moves from one layer to the next and from one LAN to the next.

UDP (User Datagram Protocol)

Does not guarantee delivery by first connecting and checking whether data is received; thus, it is called a connectionless protocol or best-effort protocol.

demarcation point (or demarc)

For most situations, the __________ is the device that marks where a telecommunications service provider's network ends and the organization's network begins.

plenum

HVAC systems and network cabling often occupy the space above the ceiling or below the floor in a data center; this space is called the __________.

True

IP adds its own Network layer header to the segment or datagram, and the entire Network layer message is now called a packet.

fragmentation

If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process called __________.

segments

If the message is too large to transport on the network, TCP divides it into smaller messages called __________.

datagram

In UDP, the message is called a ___________.

RDP (Remote Desktop Protocol)

In Windows operating systems, the Windows Remote Desktop application uses __________ to provide secure, encrypted transmissions that allow a technician to remote in—that is, to access a remote computer from the technician's local computer,

API (application programming interface)

In general, an __________ call is the method an application uses when it makes a request of the OS.

Presentation Layer

In the OSI model, the Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. For example, an e-mail message.

HTTP

In the client-server model, what is the primary protocol used for communication between a browser and Web server?

UDP because guaranteed delivery of packets is not as important as fast transmission.

Is TCP or UDP normally used when streaming live video? Why?

Bit - L1PDU

Layer 1 Physical Layer PDU name as it moves from one layer to another is called __________.

Frame - L2PDU

Layer 2 Data Link Layer PDU name as it moves from one layer to another is called __________.

True

Layer 2, the Data Link layer, is more commonly called the Link layer.

Packet - L3PDU

Layer 3 Network Layer PDU name as it moves from one layer to another is called __________.

Segment (TCP) or Datagram (UDP) - L4PDU

Layer 4 Transport Layer PDU name as it moves from one layer to another is called __________.

Payload or Data - L7PDU

Layer 7 (Application Layer), Layer 6 Presentation Layer), Layer 5 (Session Layer) PDU name as it moves from one layer to another is called __________.

Application Layer

Layer of the OSI model that describes the interface between two applications, each on separate computers.

Conversational voice, streaming live audio and voice, and streaming stored audio and voice

List three types of services a network might support that are considered part of unified communications or convergence.

TCP (Transmission Control Protocol)

Makes a connection with the end host, checks whether the data is received, and resends it if it is not. A connection-oriented protocol.

TCP (Transmission Control Protocol)

Protocol used by applications such as Web browsers and email. Guaranteed delivery takes longer and is used when it is important to know that the data reached its destination.

UDP (User Datagram Protocol)

Protocol used for broadcasting, such as streaming video or audio over the Web, where guaranteed delivery is not as important as fast transmission.It is also used to monitor network traffic.

Star-Bus Topology

Suppose a new switch is connected to the first switch by way of a network cable and three computers are connected to the new switch. Which network topology is now used?

True

The Application, Presentation, and Session layers are so intertwined that, in practice, it's often difficult to distinguish between them.

True

The Link layer puts its own control information in a Link layer header and also attaches control information to the end of the packet in a trailer. The entire Link layer message is then called a frame.

True

The Network layer header identifies the sending and receiving hosts by their IP addresses.

Session Layer

The Session layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.

(Real-time Transport Protocol)

The Session layer protocol that is specifically designed to transmit audio and video and that works in conjunction with VoIP is __________.

port number

The Transport layer header addresses the receiving application by a number called a __________.

Transport Layer

The __________ layer is responsible for transporting Application layer payloads from one application to another.

Physical

The __________ layer is the simplest layer of all and is responsible only for sending bits via a wired or wireless transmission.

Network

The __________ layer, sometimes called the Internet layer, is responsible for moving messages from one node to another until they reach the destination host.

Telnet

The __________ protocol is used by the client-server command-line application to allow an administrator or other user to"remote in"or control a computer remotely. This protocol is not encrypted.

heating, ventilation, and air conditioning (HVAC)

The __________ system controls the environment in a data center, including the temperature, humidity, airflow, and air filtering.

SMTP (Simple Mail Transfer Protocol)

The client uses __________ to send an email message to the first server, which is sometimes called the SMTP server. The first server sends the message on to the receiver's mail server, where it's stored until the recipient requests delivery.

IP (Internet Protocol).

The principal protocol used by the Network layer is the __________.

encapsulation

The process of adding a header to the data inherited from the layer above is called __________.

Header

The protocols add their own control information in an area at the beginning of the payload called the __________ to create a message ready to be transmitted to the Network layer.

PAN (Personal Area Network)

The smallest network is a __________, which is a network of personal devices, such as the network you use when you sync your cell phone and your computer.

Secure Shell (SSH)

The ssh command in Linux uses the ___________ protocol, which creates a secure channel or tunnel between two computers.

Logical Topology

The term __________ has to do with software and describes how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources, such as applications and databases, are shared on the network.

file services

The term __________ refers to a server's ability to share data files and disk storage space.

firmware

The term __________ refers to programs embedded into hardware devices and that do not change unless a firmware upgrade is performed.

physical topology

The term __________, or network topology, mostly applies to hardware and describes how computers, other devices, and cables fit together to form the physical network.

Hosts

The two end-system computers that initiate sending and receiving data are called __________.

TCP and UDP

The two main Transport Layer protocols are __________ and __________.

POP3 (Post Office Protocol, version 3)

Using __________, email is downloaded to the client computer.

IMAP4 (Internet Message Access Protocol, version 4)

Using __________, the client application manages the email stored on the server.

peer-to-peer (P2P)

Using a __________ network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.

convergence

Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as __________.

Layer 2 switches (Link Layer Switches) are the least intelligent and nonprogrammable. A router is a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.

What is the fundamental distinction between a Layer 2 switch and a router?

A MAN is a group of connected LANs in the same geographical area - for example, a handful of government offices surrounding a state capitol building. A WAN connects two LANs in different geographical areas. (The Internet)

What is the fundamental distinction between a MAN and a WAN?

A HOST is any computer on a network that hosts a resource such as an application or data, and a node is any computer or device on a network that can be addressed on the local network. A client computer or server is both a node and a host, but a router or switch does not normally host resources and is, therefore, merely a node on the network.

What is the fundamental distinction between a node and a host?

Client Server

What is the name of the domain controller database that Windows Server 2012 R2 uses to store data about user access and resources on the network?

Internet Protocol

What is the primary protocol used at the Network layer?

Remote Desktop Services

What service provided by Windows Server 2012 R2 allows a computer to serve up applications to other computers on the network?

HTTPS (HTTP Secure)

When HTTP is layered on top of an encryption protocol, such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security), the result is __________, which gives a secure transmission.

multicast distribution

When you watch a live sports event on your computer, the application is using a client-server model with one server and many clients, called a __________.

True

When your body and a component have different static charges and you touch the component, you can discharge up to 1500 volts of static electricity without seeing a spark or feeling the discharge. However, it only takes 10 volts to damage the component.

RTP

Which Session layer protocol is a streaming live video teleconference likely to use on the network?

Remote Desktop

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?

Telnet

Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?

POP3

Which email protocol allows an email client to download email messages to the local computer?

IMAP4

Which email protocol allows an email client to read mail stored on the mail server?

Layers 1 and 2

Which two OSI Layers are responsible for interfacing with the physical hardware only on the local network.

SSL and TLS

Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications?

The Transport Layer header addresses the receiving application by a number called a port number.

Which type of address is used at the Transport layer to identify the receiving application?

VoIP (Voice over IP)

__________ allows two or more people to have voice conversations over a network.

Grounding

__________ means that a device is connected directly to the earth, so that, in the event of a short, the electricity flows into the earth, rather than out of control through the device and back to the power station, which can cause an electrical fire.

Bandwidth

__________, as the term is used here, means the amount of traffic, or data transmission activity, on the network.


Related study sets

A&P The Endocrine System, Development and Inheritance,...

View Set

Writing an Informative Essay about Heroic Qualities

View Set

Chapter 10: Externalities and Public Goods

View Set

Chem Chapter 4.4 - 4.6, Chem Chapter 5, Chem Chapter 6, Chemistry Chapter 7, Chem Chapter 8,

View Set