All Together Flashcards
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? A) Layer 4 B) Layer 5 C) Layer 6 D) Layer 7
D) Layer 7
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? A) Application Layer B) Presentation Layer C) Session Layer D) Transport Layer
C) Session Layer
What is the name of the protocol data unit (PDU) of the Data Link layer? A) Packet B) Data C) Bit D) Frame
D) Frame
The segment or datagram protocol data unit exists at what layer of the OSI model? A) Application Layer B) Transport Layer C) Network Layer D) Data Link Layer
B) Transport Layer
In what network topology are devices daisy-chained together in a single line? A) Bus Topology B) Star Topology C) Star Bus Topology D) Ring Topology
A) Bus Topology
What physical network topology consists of all connected devices connecting to one central device, such as a switch? A) Bus Topology B) Ring Topology C) Hub Topology D) Star Topology
D) Star Topology
The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below? A) Demarc B) Last Mile C) Local Loop D) Point of No Return
A) Demarc
The proper handling procedures for substances such as chemical solvents are typically outlined in which of the following options?
A) Toxic Chemical Safety Procedure (TCSP
)B) Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
C) Environmental Chemical Hazard Sheet (ECHS)
D) Material Safety Data Sheet (MSDS)
D) Material Safety Data Sheet (MSDS)
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? A) Fail-open B) Fail-close C) Fail-tolerant D) Fail-dynamic
B) Fail-close
A standard network switch operates at what layer of the OSI model? A) Layer 5 B) Layer 2 C) Layer 3 D) Layer 7
B) Layer 2
Which of the following is not one of the disadvantages of peer-to-peer networks?
A) They lack scalability
B) They are not necessarily secure
C) They are impractical for connecting large numbers of computers
D) They centralize user account logins
D) They centralize user account logins
Using the same network to deliver multiple types of communications services, such as video, voice, and fax is known as: A) Multi-faceted networking B) Convergence C) Multiplexing D) Unified Networking
B) Convergence
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? A) Application B) Session C) Transport D) Network
D) Network
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read: A) Application B) Presentation C) Session D) Transport
B) Presentation
If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as: A) De-encapsulation B) Fragmentation C) Packet Splitting D) Framing
B) Fragmentation
The process of adding a header to the data inherited from the layer above is called what option below? A) Segmenting B) Encapsulation C) Fragmenting D) Appending
B) Encapsulation
When using a Windows domain, what is the domain-level account for each user known as? A) Global Account B) Universal Account C) Domain Token D) Principle Name
A) Global Account
What mail protocol is used to send mail messages to a server? A) POP3 B) IMAP4 C) SMTP D) HTTPS
C) SMTP
What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event? A) Multicast Distribution B) Multi-point Communication C) Spread Packet Delivery D) Broadcast Transmission
A) Multicast Distribution
Any computer or device on a network that can be addressed on the local network is referred to as a: A) Host B) Node C) Target D) Subject
B) Node
What are two encryption protocols commonly used with the Hypertext Transfer Protocol? A) SSH B) TLS C) SSL D) AES
B) TLS
C) SSL
What two mail delivery protocols below can be used by a client application to receive e-mail from a server? A) POP3 B) SMTP C) MGET D) IMAP4
A) POP3
D) IMAP4
Which two protocols can be used to gain remote access specifically to a server's command line interface, securely and unsecurely? A) Telnet B) SSH C) Remote Desktop D) VNC
A) Telnet
B) SSH
What are the two main Transport Layer protocols? A) IPX B) SPC C) TCP D) UDP
C) TCP
D) UDP
Static electricity can cause what two types of damage in electronic components? A) Electromagnetic Failure B) Catastrophic Failure C) Upset Failure D) Polarity Failure
B) Catastrophic failure
C) Upset failure
An IPv6 address consists of how many bits? A) 32 B) 48 C) 96 D) 128
D) 128
A port number, which identifies an application on a host, exists at what level of the OSI model? A) Application B) Transport C) Network D) Data Link
B) Transport
What are the last two parts of a host name known as? A) Top Level Domain B) Fully qualified domain name (FQDN) C) Domain Name D) Host Qualifier
C) Domain Name
What do the first 24 bits of a MAC address represent? A) Organizationally Unique Identifier B) Device ID C) Extension ID D) Network ID
A) Organizationally Unique Identifier
What command below can be used to display a complete summary of all network interfaces in a Windows computer? A) ipconfig /a B) ipconfig /all C) ipconfig /list D) ipconfig /show
B) ipconfig /all
What top level domain is used for the air-transport industry? A) .air B) .aero C) .tport D) .intl
B) .aero
How many clusters of root servers exist? A) 8 B) 10 C) 13 D) 15
C) 13
What range of ports is referred to as the "well-known" range of ports? A) 0-1023 B) 1024-49151 C) 49152-65535 D) 500-1024
A) 0-1023
A loopback IP address begins with what number? A) 254 B) 127 C) 169 D) 192
B) 127
In Linux systems, what file contains the settings for the DHCP service? A) dhcpd.conf B) dhcp.ini C) dhcpd.cfg D) dhcp.cf
A) dhcpd.conf
What command on Linux will display TCP/IP information associated with every interface on the device? A) ifconfig /all B) ifconfig -a C) ipconfig -a D) ipconfig /all
B) ifconfig -a
Which protocol below is used to make an initial connection between hosts for transferring multimedia data, relying on other protocols once a connection is established? A) SMB B) SIP C) H.323 D) NTP
B) SIP
The Network Time Protocol service uses what port number? A) TCP 123 B) TCP 89 C) UDP 123 D) UDP 90
C) UDP 123
Select the name of the free, open source software that is by far the most popular DNS server software: A) Microsoft DNS B) BIND C) Oracle Resolver D) Dnsmasq
B) BIND
Select the protocol below that is used to synchronize clocks on computers on a network: A) SMTP B) NTP C) SIP D) CIFS
B) NTP
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? A) traceroute B) ifconfig C) ping D) route
C) ping
What RFC outlines recommendations for private IP addresses? A) RFC 1900 B) RFC 1918 C) RFC 638 D) RFC 2332
B) RFC 1918
What protocol is commonly used to request configuration files from another computer? A) SNMP B) SIP C) SMB D) TFTP
D) TFTP
What two types of IP addresses are used on the internet? A) IPv4 B) IPv6 C) IPX D) IPng
A) IPv4
B) IPv6
Traditional MAC addresses are broken into two parts. Name these two parts. A) block ID B) primary octet C) secondary octet D) device ID
A) block ID
D) device ID
What two names are used to descibe the configuration in which internal and external DNS queries are handled by different DNS servers or by a single DNS server that is specially configured to keep internal and external DNS zones separate? A) walled-DNS B) split DNS C) split-horizon DNS D) DMZ DNS
B) split DNS
C) split-horizon DNS
What two ipconfig commands below are used to show DNS resolver cache information and clear the name resolver cache? A) ipconfig /releasedns B) ipconfig /alldns C) ipconfig /displaydns D) ipconfig /flushdns
C) ipconfig /displaydns
D) ipconfig /flushdns