CH1: Networking Fundamentals Flashcards

1
Q

Which of the statements below accurately describe basic network concepts? (Select two.)
A. A computing network is a group of computing resources that permit digital data exchange between routers.
B. A LAN is a group of computing devices in the same place, all interconnected via a router.
C. A WAN is a group of computer resources that can communicate over large geographical distances.
D. A protocol is a set of rules that computer devices follow to establish and maintain communications.

A

C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Match the OSI reference model layer to an appropriate description: physical, network, application, transport, and data link.

A. Involves routers that send packets
B. End users interact with this layer
C. Involves protocols like TCP and UDP
D. Involves switches that send frames

A

A. network
B. Application
C. Transport
D. Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: The layer 2 protocol data unit (PDU) includes the headers for layers 3 through 7.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the statements below accurately describe physical media? (Select two.)

A. Copper cabling variants include shielded twisted pair (STP) and unshielded twisted pair (UTP).

B. Multimode (MM) fiber optic cable can typically handle longer distance transmissions at a lower cost than single mode (SM) fiber.

C. You typically use direct-attached copper (DAC) cables to directly connect two servers or other end systems to each other.

D. Wi-Fi devices transmit data by modifying aspects of radio waves, such as amplitude, phase, or frequency.

E. Multicast traffic is used to transmit data from one host to all other hosts on a
LAN.

A

A, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Match the TCP/IP stack layer (network interface, application, transport, and internet) to the appropriate description.

A. Maps to three specific layers of the OSI model

B. You might have an Ethernet or wireless NIC at this layer

C. Deals with IP addresses

D. Passes data to the application layer

A

A. Application layer
B. Network Access layer
C. Network layer
D. Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your colleague is new to networking and asks you about network devices. Which statements below would help your colleague understand this topic?
(Select two.)

A. You use switches to connect many end systems together, at layer 3 of the OSI
model.

B. Routers are often used in WAN environments, and forward packets based on IP address information.

C. Multilayer switches perform functions of a firewall and a router.

D. Stateful firewalls have more intelligence than stateless firewalls, perhaps including application awareness features.

A

B, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do wired and wireless client both connect to the LAN using Ethernet?

A

No. Only the wired clients do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On an Ethernet cross-over cable which pins are not straight through? i.e. what are the pinouts?

A

1-2 connect to 3-6 at the other end of the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which devices require cross-over cables to connect directly out of these devices? router, switch, hub, WAP, and PC

A

PC-router, switch-switch and Hub-switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ethernet FCS field. How long is it, where is it located, and what is it used for?

A

The length is 4 bytes, located in the trailer, used for error detection - not correction, only detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11 standards define what?

A

WLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.3 standards define what?

A

Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is auto-mdix?

A

modern technology that changes logic in devices to allow straight through cables to be used for all devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many bytes is a MAC address?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the fields with the number of bytes of each, in order, of an ethernet frame?

A

Preamble(7),SFD(1), Dest(6), Source(6), Type(2), Data and Padding(46-1500), FCS(4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an OUI? and how many bytes is it?

A

Organizationally Unique Identifier, 3 bytes or 6 hex digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Ethernet broadcast address?

A

FFFF.FFFF.FFFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the Type field do in an ethernet header?

A

The two byte type defines the L3 protocol that is encapsulated within the frame. (IEEE refers to this as EtherType)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What port(s) are used by:

File Transfer Protocol (FTP)

A

Port 20/21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What port(s) are used by:

Secure Shell (SSH)

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What port(s) are used by:

Secure File Transfer Protocol (SFTP)

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What port(s) are used by:

Telnet

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What port(s) are used by:

Simple Mail Transfer Protocol (SMTP)

A

Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port(s) are used by:

Domain Name System (DNS)

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What port(s) are used by:

Dynamic Host Configuration Protocol (DHCP)

A

Port 67/68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What port(s) are used by:

Trivial File Transfer Protocol (TFTP)

A

Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What port(s) are used by:

Hypertext Transfer Protocol (HTTP)

A

Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What port(s) are used by:

Post Office Protocol V3 (POP3)

A

Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What port(s) are used by:

Network Time Protocol (NTP)

A

Port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Internet Message Access Protocol (IMAP)

A

Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What port(s) are used by:

Simple Network Management Protocol (SNMP)

A

Port 161/162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What port(s) are used by:

Lightweight Directory Access Protocol (LDAP)

A

Port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What port(s) are used by:

Hypertext Transfer Protocol Secure (HTTPS)[Secure Sockets Layer (SSL)]

A

Port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What port(s) are used by:

Server Message Block (SMB)

A

Port 445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What port(s) are used by:

Syslog

A

Port 514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What port(s) are used by:

SMTP TLS

A

Port 587

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What port(s) are used by:

Lightweight Directory Access Protocol (over SSL) (LDAPS)

A

Port 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What port(s) are used by:

IMAP over SSL

39
Q

What port(s) are used by:

POP3 over SSL

40
Q

What port(s) are used by:

Structured Query Language (SQL) Server

41
Q

What port(s) are used by:

SQLnet

42
Q

What port(s) are used by:

MySQL

43
Q

What port(s) are used by:

Remote Desktop Protocol (RDP)

44
Q

What is this protocol used for:

FTP

A

Used for the transfer of computer files from a server to a client on a computer network

45
Q

What is this protocol used for:

SSH

A

Operating network services securely over an unsecured network

46
Q

What is this protocol used for:

SFTP

A

Uses secure shell encryption to provide a high level of security for sending and receiving file transfers

47
Q

What is this protocol used for:

Telnet

A

Provides a command line interface for communication with a remote device or server

48
Q

What is this protocol used for:

SMTP

A

Used by mail servers to send, receive, and relay outgoing email between senders and receivers

49
Q

What is this protocol used for:

DNS

A

Helps Internet users and network devices discover websites using human-readable host-names, instead of numeric IP addresses

50
Q

What is this protocol used for:

DHCP

A

Provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway

51
Q

What is this protocol used for:

TFTP

A

Allows a client to get a file from or put a file onto a remote host

52
Q

What is this protocol used for:

HTTP

A

An application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack

53
Q

What is this protocol used for:

POP3

A

An application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server

54
Q

What is this protocol used for:

NTP

A

Allows the synchronization of system clocks (from desktops to servers)

55
Q

What is this protocol used for:

IMAP

A

Used by email clients to retrieve email messages from a mail server over a TCP/IP connection

56
Q

What is this protocol used for:

SNMP

A

Used to monitor and manage network devices connected over an IP address.

57
Q

What is this protocol used for:

LDAP

A

Used to lookup information or devices within a network

58
Q

What is this protocol used for:

HTTPS

A

An extension of the Hypertext Transfer Protocol. It uses encryption for secure communication over a computer network

59
Q

What is this protocol used for:

SSL

A

A security protocol that provides privacy, authentication, and integrity to Internet communications

60
Q

What is this protocol used for:

TLS

A

Facilitate privacy and data security for communications over the Internet. Upgraded version of SSL

61
Q

What is this protocol used for:

SMB

A

Used for sharing access to files, printers, serial ports and other resources on a network

62
Q

What is this protocol used for:

Syslog

A

Computer systems use to send event data logs to a central location for storage

63
Q

What is this protocol used for:

SMTP TLS

A

Used by mail servers to send, receive, and relay outgoing email between senders and receivers using TLS to secure the data

64
Q

What is this protocol used for:

LDAPS

A

Uses TLS/SSL to lookup information or devices within a network

65
Q

What is this protocol used for:

IMAP over SSL

A

Used by email clients to retrieve email messages from a mail server over a TCP/IP connection using SSL to secure the information

66
Q

What is this protocol used for:

POP3 over SSL

A

An application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server securely using SSL

67
Q

What is this protocol used for:

SQL Server

A

Supports client communication with the TCP/IP network protocol and the named pipes protocol (Microsoft)

68
Q

What is this protocol used for:

SQLnet

A

Used by Oracle SQL servers to execute SQL commands from clients, including load balancing and application-specific services

69
Q

What is this protocol used for:

MySQL

A

Facilitates communication between a MySQL client and a MySQL server. It is designed to enable the transmission of SQL queries and the reception of query results between the two parties

70
Q

What is this protocol used for:

RDP

A

Provides a user with a graphical interface to connect to another computer over a network connection

71
Q

What is this protocol used for:

SIP

A

Enables the Voice Over Internet Protocol (VoIP) by defining the messages sent between endpoints and managing the actual elements of a call

72
Q

Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.)

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP

A

D and F

HTTP, SMTP - layer 7

IP - layer 3

73
Q

Which of the following protocols are examples of TCP/IP data link layer protocols? (Choose two answers.)

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP

74
Q

The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what?

a. Same-layer interaction
b. Adjacent-layer interaction
c. OSI model
d. All of these answers are correct.

75
Q
The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of
TCP segment 1 is an example of what? 
a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. OSI model
e. All of these answers are correct.
76
Q

The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data link header and trailer, is an example of what?

a. Data encapsulation
b. Same-layer interaction
c. OSI model
d. All of these answers are correct.

77
Q

Which of the following terms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers?

a. Data
b. Chunk
c. Segment
d. Frame
e. Packet

78
Q

Which OSI layer defines the functions of logical network-wide addressing and routing?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5, 6, or 7

79
Q

Which OSI layer defines the standards for cabling and connectors?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5, 6, or 7

80
Q

In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN?

a. Only the devices that use cables are using Ethernet.
b. Only the devices that use wireless are using Ethernet.
c. Both the devices using cables and those using wireless are using Ethernet.
d. None of the devices are using Ethernet.

81
Q

Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling?

a. 10GBASE-T
b. 100BASE-T
c. 1000BASE-T
d. None of the other answers is correct.

82
Q

Which of the following is true about Ethernet crossover cables for Fast Ethernet?

a. Pins 1 and 2 are reversed on the other end of the cable.
b. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable.
c. Pins 1 and 2 on one end of the cable connect to pins 3 and 4 on the other end of the cable.
d. The cable can be up to 1000 meters long to cross over between buildings.
e. None of the other answers is correct.

83
Q

Each answer lists two types of devices used in a 100BASE-T network. If these devices were connected with UTP Ethernet cables, which pairs of devices would require a straight-through cable? (Choose three answers.)

a. PC and router
b. PC and switch
c. Hub and switch
d. Router and hub
e. Wireless access point (Ethernet port) and switch

A

B, D, and E

84
Q

Which of the following is true about the CSMA/CD algorithm?

a. The algorithm never allows collisions to occur.
b. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover.
c. The algorithm works with only two devices on the same Ethernet.
d. None of the other answers is correct.

85
Q

Which of the following is true about the Ethernet FCS field?

a. Ethernet uses FCS for error recovery.
b. It is 2 bytes long.
c. It resides in the Ethernet trailer, not the Ethernet header.
d. It is used for encryption.

86
Q

Which of the following are true about the format of Ethernet addresses? (Choose three answers.)

a. Each manufacturer puts a unique OUI code into the first 2 bytes of the address.
b. Each manufacturer puts a unique OUI code into the first 3 bytes of the address.
c. Each manufacturer puts a unique OUI code into the first half of the address.
d. The part of the address that holds this manufacturer’s code is called the MAC.
e. The part of the address that holds this manufacturer’s code is called the OUI.
f. The part of the address that holds this manufacturer’s code has no specific name.

A

B, C, and E

87
Q

Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? (Choose two answers.)

a. Burned-in address
b. Unicast address
c. Broadcast address
d. Multicast address

88
Q

Which of the following header fields identify which TCP/IP application gets data received by the computer? (Choose two answers.)

a. Ethernet Type
b. SNAP Protocol Type
c. IP Protocol
d. TCP Port Number
e. UDP Port Number

89
Q

Which of the following are typical functions of TCP? (Choose four answers.)

a. Flow control (windowing)
b. Error recovery
c. Multiplexing using port numbers
d. Routing
e. Encryption
f. Ordered data transfer

A

A, B, C, F

90
Q

Which of the following functions is performed by both TCP and UDP?

a. Windowing
b. Error recovery
c. Multiplexing using port numbers
d. Routing
e. Encryption
f. Ordered data transfer

91
Q

What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers and trailers from Layers 1 to 3? (Choose two answers.)

a. L3PDU
b. Chunk
c. Segment
d. Packet
e. Frame
f. L4PDU

92
Q

In the URI http://www.certskills.com/ICND1, which part identifies the web server?

a. http
b. www.certskills.com
c. certskills.com
d. http://www.certskills.com
e. The file name.html includes the hostname.

93
Q

Fred opens a web browser and connects to the www.certskills.com website. Which of the following are typically true about what happens between Fred’s web browser and the web server? (Choose two answers.)

a. Messages flowing toward the server use UDP destination port 80.
b. Messages flowing from the server typically use RTP.
c. Messages flowing to the client typically use a source TCP port number of 80.
d. Messages flowing to the server typically use TCP.