Chapter 1 Flashcards

1
Q
You have implemented a network where hosts are assigned specific roles, such as for file sharing and rpinting. Other hosts access those resources but do not host services of their own. What type of network do you have?
A Internet
B Peer-to-peer
C Client/Server
D Extranet
A

C Client/Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?
A Polling
B Peer-to-Peer
C Mulitple access
D Client/Server
A

B Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following topologies connects each network device to a central hub?
A Ring
B Bus
C Mesh
D Star
A

D Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
You have a small network that uses a hub to connect multiple devices. What physical topology is used?
A Star
B Mesh
C Ring
D Bus
A

D Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device?
A Bus
B Ring
C Tree
D Star
A

B Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
You have been asked to implement a network infrastructure that will accomadate failed connections. Whcih of the following network topologies provides redundancy for a failed link?
A Mesh
B Bus
C Ring
D Star
A

A Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have a network that uses a logical rinf topology. How do messages travel through the network?
A Messages travel from one device tot he next until they reach the destination.
B Messages are sent to a central device which then forwards the message to the destination.
C Messages are sent directly to the destination.
D Messages are sent to all devices connected to the network.

A

A Messages travel from one device tot he next until they reach the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following topologies connects all devioces to a trunk cable?
A Tree
B Bus
C Ring
D Star
A

B Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
What device is used to create a physical star topology?
A Bridge
B Firewall
C Router
D Switch
A

D Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have a network that uses a logical bus topology. How do messages travel through the network.
A Messages travel from one device to the next until they reach the destination device.
B Messages are sent directly to the correct destination device.
C Messages are broadcast to all devices connected to the network.
D Messages are sent to a central device which then forwards the message to the destination device.

A

C Messages are broadcast to all devices connected to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
You want to implement a fault tolerant topology as you interconnect routers on your wide area netowrk. Which of the following would meet your needs?
A Bus
B Ring
C Mesh
D Star
A

C Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following topologies connects each device to a neighboring device?
A Star
B Tree
C Ring
D Bus
A

C Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
You have implemented an ad-hoc wireless network that doesnt employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical topology has been implemented in this type of network?
A Ring
B Tree
C Bus
D Star
E Mesh
A

E Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What protocol sends email to a mail server?
A SNMP
B SMTP
C POP3
D FTP
E TFTP
A

B SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
You have a large TCP/IP network and want to keep hosts real time clocks syncronized. What protocol should you use?
A NTP
B SAP
C SNMP
D SMTP
E NNTP
A

A NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your company has just acquired another comapany in the same city. You are given the task of integrating the two email systems so that messages can be exchanged between the email servers. However, each network uses an email package froma different vendor.
Which TCP/IP protocol will enable messages to be exchanged between systems?
A FTP
B SMTP
C IMAP4
D ICMP
E POP3

A

B SMTP

17
Q
Which protocol is used on the world wide web to transmit web pages to web browsers?
A NNTP
B HTTP
C HTML
D SMTP
A

B HTTP

18
Q
You want to transfer a file from a Unix server to a windows 2000 computer. Which of the following utilities could you use to do this? Select all that apply.
FTP
Tracert
Netstat
NBSTAT
Telnet
TFTP
A

FTP

TFTP

19
Q
You want to allow your users to download files form a server runing the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability?
A HTML
B TCP
C FTP
D HTTP
E IP
F TFTP
A

C FTP

20
Q
Which of the following protocols stores email on the mail server and gives a choice to download mail or keep it on the server?
A NTP
B SMTP
C POP3
D IMAP4
A

D IMAP4

21
Q
Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server?
A POP3
B SMTP
C FTP
D SPC
E SNMP
A

A POP3

22
Q
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
A TCP
B ARP
C ICMP
D IGMP
E DHCP
F IP
A

C ICMP

23
Q

You are asked to recommend an email retieval protocol for a company’s sales team. The sales team needs to access email from various locations and possibly different computers. the sales team does not want to worry about transferring email messages or files back and forth between these computers.
Which email protocol was designed for this purpose?
A SMTP
B POP4
C POP3
D MFTP
F IMAP

A

F IMAP

Internet Message Access Protocol

24
Q
The data link layer of the OSI model is compromised of two sublayers. Waht are they?
A LAT
B DLC
C MAC
D SAN
E LLC
A

C MAC

E LLC

25
Q

In the OSI model, which of the following functions are performed at the Application layer? Select all that apply.
A Data translation
B Conversion identification
C Enabling communication between network clients and services
D Integration of network functionality into the host operating system

A

C Enabling communication between network clients and services
D Integration of network functionality into the host operating system

26
Q

Which three of the following functions are performed by the OSI Transport layer?
A Reliable message delivery
B Consistent data formatting between disimiliar systems
C Control media access, logical topology, and device identification
D Format packets for delivery
E Path indentification and selection
F End-to-end flow control
G Data segmentation and reassembly

A

A Reliable message delivery
F End-to-end flow control
G Data segmentation and reassembly

27
Q
You are an application developer and are writing a program to exchange video files through TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?
A TFPT
B RIP
C FTP
D UDP
E TCP
F IP
A

E TCP

28
Q

Which of the following are functions of the MAC sublayer? Select two.
A Creating routing tables based on MAC addresses
B Defining a unique hardware address for each device on the network
C Letting devices on the network have access to the LAN
D Mapping hardware addresses to link-layer addresses

A

B Defining a unique hardware address for each device on the network
C Letting devices on the network have access to the LAN

29
Q

In the OSI model, what is the primary function of the Network Layer?
A Allows applications to establish, use, and end a connection
B Routes messages between networks
C Transmits data frames
D Ensures that packets are delivered with no loss or duplication

A

B Routes messages between networks

30
Q
The UDP tansport protocol provides which of the following features? select all that apply.
A Gauranteed delivery
B Connectionless datagram services
C Low overhead
D Sequence numbers and acknowledgements
A

B Connectionless datagram services

C Low overhead

31
Q
Which OSI model layer is responsible for guaranteeing reliable message delivery?
A Application
B Data link
C Transport
D Session
A

C Transport

32
Q

Which of the following functions are performed at the Physical layer of the OSI model?
A Enablement of netowork services
B Movement of data across network cables
C Conversation identification
D Provision of an environment in which to run network applications
E Data translation

A

B Movement of data across network cables

33
Q

What is the basic purpose of the OSI Physical Layer?
A Coordinates rules for managing network servers.
B Defines basic physical structures, such as disks.
C Coordinates rules for transmitting bits.
D Coordinates rules for routing packets.

A

C Coordinates rules for transmitting bits.

34
Q
Which of the following tasks is associated with the Session layer?
A Host ID number assignment
B Acknowledge coordination
C Transmission syncronization
D Connection establishment
A

D Connection establishment

35
Q

Which two of the following are included as part of Data Link layer specifications?
A Syncronizing individual bits as they are transmitted through the network.
B Identifying physical network devices.
C Compostion of elctrical signals as they pass through the transmissionmedium.
D Controlling how messgaes are propagated through the network.

A

B Identifying physical network devices.

D Controlling how messgaes are propagated through the network.

36
Q

In the OSI model, which of the following functions are performed at the Presentation layer? select two.
A Maintain sperate client connections
B Specify data format
C Encrypt and compress
D Provide network services
E Transmit data frames
F Handle general network access, flow control, and rror recovery

A

B Specify data format

C Encrypt and compress

37
Q
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?
A UDP
B UCP
C TCP
D UDB
A

C TCP