CH1 - Course Quiz Flashcards

1
Q

Routers function at which Layer of the OSI Model?

Transport
Network
Physical
Data Link

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Layer of the OSI Model refers to the Code built into Operating Systems that Enables Network-Aware Applications?

Session
Application
Transport
Presentation

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many Layers does the OSI Model Contain?

3
9
5
7

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement desribes an IP Address?

It is a Unique Identifier burned into the NIC when it is manufactured.
It is a Number shared by All Computers on the same Network.
It is a Unique Dotted Decimal Number assigned to every Network Device.
It is a Number assigned only to Routers, identifying their Priority Ratings.

A

It is a Unique Dotted Decimal Number assigned to every Network Device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A MAC Address is also known as ______ address?

IP
Router
Physical
Logical

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Layer of the OSI Model defines a Method of Transmission using Radio Waves?

Physical
Application
Presentation
Session

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routers use Logical Addresses to forward data?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Layer of the OSI Model uses Routers and IP Addresses to ensure that Packets arrive at the Correct System?

Data Link
Application
Network
Presentation

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two parts are included in a MAC Address?

The IP Address and the NIC’s Serial Number
The Network Address and the Node Address
The Computer Name and the Node Address
The Organizationally Unique Identifier (OUI) and the Device ID of the NIC

A

The Organizationally Unique Identifier (OUI) and the Device ID of the NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which OSI Model Layer initiates requests for Packets that were not received in good order?

Application
Session
Transport
Network

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Layer of the OSI Model adds Sender and Receipient MAC Addresses to Frames?

Network
Data Link
Transport
Presentation

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are incoming frames handled by a Switch?

The Switch broadcasts the contents of the frames to every device on the Network.
The Frames are sent only to the interface associated with the Destination MAC Address
The Frames are received by every NIC, but only the NIC with the matching MAC Address processes the Frame.
The Switch forwards the Frames to every device on the Network.

A

The Frames are sent only to the interface associated with the Destination MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where does the CRC originate in a Network Frame?

The receiving NIC attaches it.
The Network Administrator attaches it.
The sending NIC attaches it.
The Network OS generates it and attaches it.

A

The sending NIC attaches it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logic Link Control (LLC) and Media Access Control (MAC) are two parts of which OSI Model Layer?

Transport
Internet
Application
Link

A

Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe what happens at each Router as Data is sent from one Computer to another on a TCP/IP Network such as the Internet?

A

The Data can go through many Routers before it reaches its Destination.
Each Router strips off the incoming Frame, using the Routing Tables determines where to send the Data according to the IP Address in the Packet, creates a new Frame, then sends the Packet within a Frame on its way towards the Destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name a mnemonic presented in the Text as a way to memorize the Layers of the OSI Model?

A
All --------------- Application
People -------- Presentation
Seem ---------- Session
To --------------- Transport
Need ----------- Network
Data ------------ Data Link (MAC/LLC)
Protection ---- Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe how the Encapsulation process is used in the Transport, Network, and Data Link Layers?

A

The Transport Layer creates a Segment or Datagram and hands it down to the Network Layer.
That Network Layer adds IP Information, Encapsulating the Segment or Datagram.
The Data Link Layer wraps all that up Encapsulating the Packet in a Frame for delivery over the Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Briefly describe how the Internet Protocol makes sure that a piece of data gets to its intended destination on the Network?

A

TCP/IP is the Primary Logical Addressing Protocol
IP makes sure that a piece of Data gets to where it needs to go on the Network.
It does this by giving each device on the Network a Unique Identifier called an IP Address.
An IP Address is known as a Logical Address to distinguish it from the Physical/MAC Address of the NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does the destination system know how to put packets in the correct order?

A

The Sending System embeds a sequencing number into the Data of each Packet containing a segment.
By reading the sequencing numbers, the Receiving System knows both the total number of segments and how to put them back together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The OSI Model’s Session Layer initiates sessions, accepts incoming sessions, and _________ existing sessions?

A

opens and closes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

All FCSs are ________ bytes long?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When a Serving Computer receives a request for some data, it must be able to chop the requested data into chunks that will fit into a packet, organize the packets for the benefit of the receiving system, and hand them to the NIC for sending. This is called __________?

A

segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ___________ is a tool that enables a technician to see electrical pulses?

A

oscilloscope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If you want to see how many sessions are running on a TCP/IP Network, you should use the ________ program from the command prompt?

A

netstat

netstat -a

25
Q

Which Layer of the OSI Model uses Connection-Oriented Protocols?

Link
Transport
Internet
Application

A

Transport (Layer 4)

26
Q

What Device connects Subnets?

Bridge
Router
NIC
MAC Address

A

Router

27
Q

For a Network Technician, one benefit of understanding the OSI Seven-Layer Model is using it as a primary tool for _______?

connecting PCs to the Internet
securing a PC
purchasing NICs
troubleshooting Networks

A

troubleshooting Networks

28
Q

How long is a MAC Address?

6 binary digits
48 bits
32 bits
6 hexadecimal characters

A

48 bits

Explanation:
48 bits
12 hexadecimal characters

29
Q

The FCS uses a type of binary math called a Cyclic Redundancy Check (CRC) that the receiving NIC uses to verify that the data arrived intact?

True
False

A

True

30
Q

What unique identifier is assigned to each device on the Network by the IP protocol in the OSI Model’s Network Layer?

Router name
IP Address
MAC Address
Port Number

A

IP Address

31
Q

Frames in MOST wired Networks hold at most ______?

150 bytes of data
48 bytes of data
1500 bytes of data
1024 bytes of data

A

1500 bytes of data

32
Q

Which is a Broadcast MAC Address?

255.255.255.255
256
FF-FF-FF-FF-FF-FF
1000

A

FF-FF-FF-FF-FF-FF

33
Q

Which Layer of the OSI Model is associated with moving Data between Computers?

Layer 2
Layer 1
Layer 4
Layer 3

A

Layer 1 - Physical

34
Q

One function of a NIC is to ______?

use the CRC to verify the Data within each Frame arrived intact
utilize Network Protocols for Data Transfer between the PC and the Network
provide a standard way for programmers to extend application capabilities
assign Logical IP Addresses

A

use the CRC to verify the Data within each Frame arrived intact

35
Q

When a NIC sends a Frame that contains the Broadcast Address, every NIC on the Network processes that Frame?

True
False

A

True

36
Q

Name the 5 parts that make up the basic generic Ethernet Frame?

A
1 - Recipient's/Destination MAC Address
2 - Sender's/Source MAC Address
3 - Data Type Field
4 - DATA
5 - FCS (Frame Check Sequence)
37
Q

Explain how a CRC is used to figure out whether the Data recevied is accurate or not?

A

CRC is a 32 bit Redundancy check that basically says if the Frame Size is smaller/degraded from when the Frame started, then it requests the Full Frame to be sent again to ensure its properly sent in its entirety.

38
Q

Describe the functions of the OSI Model’s Logical Link Control (LLC) Sublayer?

A

The LLC is the aspect of the NIC that talks to the System’s OS usually via Device Drivers.
The LLC also handles multiple network protocols and provides flow/error control.

39
Q

A MAC Address is usually writen in ________ notation?

A

hexadecimal/hex

40
Q

A Container created at the OSI Data Linke Layer for carrying discrete chunks of data across a Network is called a ________?

A

Frame

41
Q

The Connectionless Protocol is called the ________?

A

UDP (User Datagram Protocol)

42
Q

Different types of Networks use different sizes of ________?

A

Frames

43
Q

Named after two Protocols, __________ is really a Protocol suite designed to work together?

A

TCP/IP (Transmission Control Protocol/Internet Protocol)

44
Q

Applications may include additional functions, such as Encryption, User Authentication, and Tools to control the look of the data?

True
False

A

True

45
Q

Which statement describes a capability of Routers?

Routers allow Network connections across data lines that do not use Ethernet.
Routers allow MAC Address to be assigned to each computer.
Routers allow a Network Admin to configure Hardware settings.
Routers use the COmputer Name to forward data.

A

Routers allow Network Connections across data lines that do not use Ethernet.

46
Q

Which statement best describes an Application Programming Interface?

It is a protocol that allows Web browsers to request data from a Web Server.
It provides programmers with a standard way to extend an applications capaibilities.
It is the GUI interface that WIndows uses to interact with the user.
It is the Top Layer of the OSI Model of Networking.

A

It provides programmers with a standard way to extend an application’s capabilities.

47
Q

The Transport Layer creates a Segment or Datagram and hands it down to the Network Layer?

True
False

A

True

48
Q

The Application Layer doesn’t refer to the Applications themselves; it refers to the Code built into all Operating Systems that enables Network-Aware Applications?

True
False

A

True

49
Q

All NICs on the same network must use the same ________, or they will not be able to communicate with other NICs?

Frame Check Sequence
IP Address
Frame Type
MAC Address

A

Frame Type

50
Q

Explian what happens to a Packet when it reaches the Destination Subnet Router?

A

Once the Packet reaches the Destination Subnet’s Router, the Router will strip off the Incoming Frame, look at the Destination IP Address, then add a Frame with the appropriate Destination MAC Address that matches the Destination IP Address and ship it off.

51
Q

What Network Device (found on every network connected computer) creates Outgoing Frames, Reads Incoming Frames, and attches MAC Addresses?

A

Network Interface Card (NIC)

52
Q

What is the Role of the NIC’s Driver Software?

A

The NIC’s Driver Software is the interconnection between the Hardware and the Software.
The NIC Driver knows how to communicate with the NIC to send and receive Frames.
The NIC Driver hands off the Packet to other Services that know how to deal with all the separate Packets and turn them into Web Pages, Email, Files, etc…

53
Q

In the context of Networking, what are Protocols?

A

Established set of rules that determine how data is transmitted between devices on a Network.

54
Q

Briefly describe the Two distinct jobs a NIC performs to keeping Data moving?

A

First: Logical Link Control (LLC) - is the aspect of the NIC that talks to the OS and handles multiple Network Protocols and provides Flow Control.

Second: Media Access Control (MAC) - creates and addresses the Frame.

55
Q

Layer 6 of the OSI Model is called the _______ Layer?

A

Presentation

56
Q

The OSI Model’s Presentation Layer translates data from lower layers into a format usable by the _________ Layer, and visa versa?

A

Application

57
Q

If you have a Windows System, type _________ from the command prompt to display the MAC Address for your Computer?

A

ipconfig /all

58
Q

All Operating Systems have __________ that programmers can use to make their programs Network aware?

A

Application Programming Interfaces (APIs)