Ch 1: Introduction to networking Flashcards

1
Q

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What layer of the OSI model describes how data between applications is synced and recovered if messages don’t arrive intact at the receiving application?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Data Link Layer utilizes what name for its protocol data unit (PDU)?

A

frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What statement accurately reflects what occurs when a message is too large to transport on a network?

A

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a defining characteristic of a bus topology based network?

A

Devices are daisy-chained together in a single line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?

A

star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

A

Material Safety Data Sheet (MSDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

A

fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

A

fail-close

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

At what layer of the OSI model does a network switch normally operate?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not one of the disadvantages of peer-to-peer networks?

A

They centralize user account logins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

A

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an example of encapsulation?

A

The addition of a header to data inherited from the layer above in the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What mail protocol is used to send mail messages to a server?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most popular web server application?

17
Q

The TCP and UDP protocols both exist at what layer of the OSI model?

18
Q

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?

A

MAC (Media Access Control) address

19
Q

In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

20
Q

What federal agency is charged with safety and health in the workplace?

A

Occupational Safety and Health Administration (OSHA)

21
Q

What is the minimal amount of voltage required to damage an electrical component?

22
Q

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors?

A

upset failure

23
Q

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?

A

Application

24
Q

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?

A

The packet will be divided into smaller packets using fragmentation.

25
In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire?
fire suppression agent
26
In the United States, who is able to activate the Emergency Alert System at the national level?
The President
27
What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?
IP address
28
What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?
SNMP
29
The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?
Remote Desktop Protocol (RDP)
30
In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?
Active Directory Domain Services (AD DS)