CH1: Networking Fundamentals Flashcards
Which of the statements below accurately describe basic network concepts? (Select two.)
A. A computing network is a group of computing resources that permit digital data exchange between routers.
B. A LAN is a group of computing devices in the same place, all interconnected via a router.
C. A WAN is a group of computer resources that can communicate over large geographical distances.
D. A protocol is a set of rules that computer devices follow to establish and maintain communications.
C, D
Match the OSI reference model layer to an appropriate description: physical, network, application, transport, and data link.
A. Involves routers that send packets
B. End users interact with this layer
C. Involves protocols like TCP and UDP
D. Involves switches that send frames
A. network
B. Application
C. Transport
D. Data Link
T/F: The layer 2 protocol data unit (PDU) includes the headers for layers 3 through 7.
True
Which of the statements below accurately describe physical media? (Select two.)
A. Copper cabling variants include shielded twisted pair (STP) and unshielded twisted pair (UTP).
B. Multimode (MM) fiber optic cable can typically handle longer distance transmissions at a lower cost than single mode (SM) fiber.
C. You typically use direct-attached copper (DAC) cables to directly connect two servers or other end systems to each other.
D. Wi-Fi devices transmit data by modifying aspects of radio waves, such as amplitude, phase, or frequency.
E. Multicast traffic is used to transmit data from one host to all other hosts on a
LAN.
A, D
Match the TCP/IP stack layer (network interface, application, transport, and internet) to the appropriate description.
A. Maps to three specific layers of the OSI model
B. You might have an Ethernet or wireless NIC at this layer
C. Deals with IP addresses
D. Passes data to the application layer
A. Application layer
B. Network Access layer
C. Network layer
D. Transport layer
Your colleague is new to networking and asks you about network devices. Which statements below would help your colleague understand this topic?
(Select two.)
A. You use switches to connect many end systems together, at layer 3 of the OSI
model.
B. Routers are often used in WAN environments, and forward packets based on IP address information.
C. Multilayer switches perform functions of a firewall and a router.
D. Stateful firewalls have more intelligence than stateless firewalls, perhaps including application awareness features.
B, D
Do wired and wireless client both connect to the LAN using Ethernet?
No. Only the wired clients do.
On an Ethernet cross-over cable which pins are not straight through? i.e. what are the pinouts?
1-2 connect to 3-6 at the other end of the cable.
Which devices require cross-over cables to connect directly out of these devices? router, switch, hub, WAP, and PC
PC-router, switch-switch and Hub-switch.
Ethernet FCS field. How long is it, where is it located, and what is it used for?
The length is 4 bytes, located in the trailer, used for error detection - not correction, only detection.
802.11 standards define what?
WLANs
802.3 standards define what?
Ethernet.
What is auto-mdix?
modern technology that changes logic in devices to allow straight through cables to be used for all devices.
How many bytes is a MAC address?
6
What are the fields with the number of bytes of each, in order, of an ethernet frame?
Preamble(7),SFD(1), Dest(6), Source(6), Type(2), Data and Padding(46-1500), FCS(4)
What is an OUI? and how many bytes is it?
Organizationally Unique Identifier, 3 bytes or 6 hex digits
What is the Ethernet broadcast address?
FFFF.FFFF.FFFF
What does the Type field do in an ethernet header?
The two byte type defines the L3 protocol that is encapsulated within the frame. (IEEE refers to this as EtherType)
What port(s) are used by:
File Transfer Protocol (FTP)
Port 20/21
What port(s) are used by:
Secure Shell (SSH)
Port 22
What port(s) are used by:
Secure File Transfer Protocol (SFTP)
Port 22
What port(s) are used by:
Telnet
Port 23
What port(s) are used by:
Simple Mail Transfer Protocol (SMTP)
Port 25
What port(s) are used by:
Domain Name System (DNS)
Port 53
What port(s) are used by:
Dynamic Host Configuration Protocol (DHCP)
Port 67/68
What port(s) are used by:
Trivial File Transfer Protocol (TFTP)
Port 69
What port(s) are used by:
Hypertext Transfer Protocol (HTTP)
Port 80
What port(s) are used by:
Post Office Protocol V3 (POP3)
Port 110
What port(s) are used by:
Network Time Protocol (NTP)
Port 123
Internet Message Access Protocol (IMAP)
Port 143
What port(s) are used by:
Simple Network Management Protocol (SNMP)
Port 161/162
What port(s) are used by:
Lightweight Directory Access Protocol (LDAP)
Port 389
What port(s) are used by:
Hypertext Transfer Protocol Secure (HTTPS)[Secure Sockets Layer (SSL)]
Port 443
What port(s) are used by:
Server Message Block (SMB)
Port 445
What port(s) are used by:
Syslog
Port 514
What port(s) are used by:
SMTP TLS
Port 587
What port(s) are used by:
Lightweight Directory Access Protocol (over SSL) (LDAPS)
Port 636
What port(s) are used by:
IMAP over SSL
Port 993
What port(s) are used by:
POP3 over SSL
Port 995
What port(s) are used by:
Structured Query Language (SQL) Server
Port 1433
What port(s) are used by:
SQLnet
Port 1521
What port(s) are used by:
MySQL
Port 3306
What port(s) are used by:
Remote Desktop Protocol (RDP)
Port 3389
What is this protocol used for:
FTP
Used for the transfer of computer files from a server to a client on a computer network
What is this protocol used for:
SSH
Operating network services securely over an unsecured network
What is this protocol used for:
SFTP
Uses secure shell encryption to provide a high level of security for sending and receiving file transfers
What is this protocol used for:
Telnet
Provides a command line interface for communication with a remote device or server
What is this protocol used for:
SMTP
Used by mail servers to send, receive, and relay outgoing email between senders and receivers
What is this protocol used for:
DNS
Helps Internet users and network devices discover websites using human-readable host-names, instead of numeric IP addresses
What is this protocol used for:
DHCP
Provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway
What is this protocol used for:
TFTP
Allows a client to get a file from or put a file onto a remote host
What is this protocol used for:
HTTP
An application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack
What is this protocol used for:
POP3
An application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server
What is this protocol used for:
NTP
Allows the synchronization of system clocks (from desktops to servers)
What is this protocol used for:
IMAP
Used by email clients to retrieve email messages from a mail server over a TCP/IP connection
What is this protocol used for:
SNMP
Used to monitor and manage network devices connected over an IP address.
What is this protocol used for:
LDAP
Used to lookup information or devices within a network
What is this protocol used for:
HTTPS
An extension of the Hypertext Transfer Protocol. It uses encryption for secure communication over a computer network
What is this protocol used for:
SSL
A security protocol that provides privacy, authentication, and integrity to Internet communications
What is this protocol used for:
TLS
Facilitate privacy and data security for communications over the Internet. Upgraded version of SSL
What is this protocol used for:
SMB
Used for sharing access to files, printers, serial ports and other resources on a network
What is this protocol used for:
Syslog
Computer systems use to send event data logs to a central location for storage
What is this protocol used for:
SMTP TLS
Used by mail servers to send, receive, and relay outgoing email between senders and receivers using TLS to secure the data
What is this protocol used for:
LDAPS
Uses TLS/SSL to lookup information or devices within a network
What is this protocol used for:
IMAP over SSL
Used by email clients to retrieve email messages from a mail server over a TCP/IP connection using SSL to secure the information
What is this protocol used for:
POP3 over SSL
An application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server securely using SSL
What is this protocol used for:
SQL Server
Supports client communication with the TCP/IP network protocol and the named pipes protocol (Microsoft)
What is this protocol used for:
SQLnet
Used by Oracle SQL servers to execute SQL commands from clients, including load balancing and application-specific services
What is this protocol used for:
MySQL
Facilitates communication between a MySQL client and a MySQL server. It is designed to enable the transmission of SQL queries and the reception of query results between the two parties
What is this protocol used for:
RDP
Provides a user with a graphical interface to connect to another computer over a network connection
What is this protocol used for:
SIP
Enables the Voice Over Internet Protocol (VoIP) by defining the messages sent between endpoints and managing the actual elements of a call
Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.)
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
D and F
HTTP, SMTP - layer 7
IP - layer 3
Which of the following protocols are examples of TCP/IP data link layer protocols? (Choose two answers.)
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP
A and G
The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what?
a. Same-layer interaction
b. Adjacent-layer interaction
c. OSI model
d. All of these answers are correct.
B
The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1 is an example of what? a. Data encapsulation b. Same-layer interaction c. Adjacent-layer interaction d. OSI model e. All of these answers are correct.
B
The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data link header and trailer, is an example of what?
a. Data encapsulation
b. Same-layer interaction
c. OSI model
d. All of these answers are correct.
A
Which of the following terms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers?
a. Data
b. Chunk
c. Segment
d. Frame
e. Packet
D
Which OSI layer defines the functions of logical network-wide addressing and routing?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5, 6, or 7
C
Which OSI layer defines the standards for cabling and connectors?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5, 6, or 7
A
In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN?
a. Only the devices that use cables are using Ethernet.
b. Only the devices that use wireless are using Ethernet.
c. Both the devices using cables and those using wireless are using Ethernet.
d. None of the devices are using Ethernet.
A
Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling?
a. 10GBASE-T
b. 100BASE-T
c. 1000BASE-T
d. None of the other answers is correct.
C
Which of the following is true about Ethernet crossover cables for Fast Ethernet?
a. Pins 1 and 2 are reversed on the other end of the cable.
b. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable.
c. Pins 1 and 2 on one end of the cable connect to pins 3 and 4 on the other end of the cable.
d. The cable can be up to 1000 meters long to cross over between buildings.
e. None of the other answers is correct.
B
Each answer lists two types of devices used in a 100BASE-T network. If these devices were connected with UTP Ethernet cables, which pairs of devices would require a straight-through cable? (Choose three answers.)
a. PC and router
b. PC and switch
c. Hub and switch
d. Router and hub
e. Wireless access point (Ethernet port) and switch
B, D, and E
Which of the following is true about the CSMA/CD algorithm?
a. The algorithm never allows collisions to occur.
b. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover.
c. The algorithm works with only two devices on the same Ethernet.
d. None of the other answers is correct.
B
Which of the following is true about the Ethernet FCS field?
a. Ethernet uses FCS for error recovery.
b. It is 2 bytes long.
c. It resides in the Ethernet trailer, not the Ethernet header.
d. It is used for encryption.
C
Which of the following are true about the format of Ethernet addresses? (Choose three answers.)
a. Each manufacturer puts a unique OUI code into the first 2 bytes of the address.
b. Each manufacturer puts a unique OUI code into the first 3 bytes of the address.
c. Each manufacturer puts a unique OUI code into the first half of the address.
d. The part of the address that holds this manufacturer’s code is called the MAC.
e. The part of the address that holds this manufacturer’s code is called the OUI.
f. The part of the address that holds this manufacturer’s code has no specific name.
B, C, and E
Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? (Choose two answers.)
a. Burned-in address
b. Unicast address
c. Broadcast address
d. Multicast address
C and D
Which of the following header fields identify which TCP/IP application gets data received by the computer? (Choose two answers.)
a. Ethernet Type
b. SNAP Protocol Type
c. IP Protocol
d. TCP Port Number
e. UDP Port Number
D, E
Which of the following are typical functions of TCP? (Choose four answers.)
a. Flow control (windowing)
b. Error recovery
c. Multiplexing using port numbers
d. Routing
e. Encryption
f. Ordered data transfer
A, B, C, F
Which of the following functions is performed by both TCP and UDP?
a. Windowing
b. Error recovery
c. Multiplexing using port numbers
d. Routing
e. Encryption
f. Ordered data transfer
C
What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers and trailers from Layers 1 to 3? (Choose two answers.)
a. L3PDU
b. Chunk
c. Segment
d. Packet
e. Frame
f. L4PDU
C, F
In the URI http://www.certskills.com/ICND1, which part identifies the web server?
a. http
b. www.certskills.com
c. certskills.com
d. http://www.certskills.com
e. The file name.html includes the hostname.
B
Fred opens a web browser and connects to the www.certskills.com website. Which of the following are typically true about what happens between Fred’s web browser and the web server? (Choose two answers.)
a. Messages flowing toward the server use UDP destination port 80.
b. Messages flowing from the server typically use RTP.
c. Messages flowing to the client typically use a source TCP port number of 80.
d. Messages flowing to the server typically use TCP.
C, D