Chapter 1 Flashcards
You have implemented a network where hosts are assigned specific roles, such as for file sharing and rpinting. Other hosts access those resources but do not host services of their own. What type of network do you have? A Internet B Peer-to-peer C Client/Server D Extranet
C Client/Server
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? A Polling B Peer-to-Peer C Mulitple access D Client/Server
B Peer-to-Peer
Which of the following topologies connects each network device to a central hub? A Ring B Bus C Mesh D Star
D Star
You have a small network that uses a hub to connect multiple devices. What physical topology is used? A Star B Mesh C Ring D Bus
D Star
In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? A Bus B Ring C Tree D Star
B Ring
You have been asked to implement a network infrastructure that will accomadate failed connections. Whcih of the following network topologies provides redundancy for a failed link? A Mesh B Bus C Ring D Star
A Mesh
You have a network that uses a logical rinf topology. How do messages travel through the network?
A Messages travel from one device tot he next until they reach the destination.
B Messages are sent to a central device which then forwards the message to the destination.
C Messages are sent directly to the destination.
D Messages are sent to all devices connected to the network.
A Messages travel from one device tot he next until they reach the destination.
Which of the following topologies connects all devioces to a trunk cable? A Tree B Bus C Ring D Star
B Bus
What device is used to create a physical star topology? A Bridge B Firewall C Router D Switch
D Switch
You have a network that uses a logical bus topology. How do messages travel through the network.
A Messages travel from one device to the next until they reach the destination device.
B Messages are sent directly to the correct destination device.
C Messages are broadcast to all devices connected to the network.
D Messages are sent to a central device which then forwards the message to the destination device.
C Messages are broadcast to all devices connected to the network.
You want to implement a fault tolerant topology as you interconnect routers on your wide area netowrk. Which of the following would meet your needs? A Bus B Ring C Mesh D Star
C Mesh
Which of the following topologies connects each device to a neighboring device? A Star B Tree C Ring D Bus
C Ring
You have implemented an ad-hoc wireless network that doesnt employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical topology has been implemented in this type of network? A Ring B Tree C Bus D Star E Mesh
E Mesh
What protocol sends email to a mail server? A SNMP B SMTP C POP3 D FTP E TFTP
B SMTP
You have a large TCP/IP network and want to keep hosts real time clocks syncronized. What protocol should you use? A NTP B SAP C SNMP D SMTP E NNTP
A NTP
Your company has just acquired another comapany in the same city. You are given the task of integrating the two email systems so that messages can be exchanged between the email servers. However, each network uses an email package froma different vendor.
Which TCP/IP protocol will enable messages to be exchanged between systems?
A FTP
B SMTP
C IMAP4
D ICMP
E POP3
B SMTP
Which protocol is used on the world wide web to transmit web pages to web browsers? A NNTP B HTTP C HTML D SMTP
B HTTP
You want to transfer a file from a Unix server to a windows 2000 computer. Which of the following utilities could you use to do this? Select all that apply. FTP Tracert Netstat NBSTAT Telnet TFTP
FTP
TFTP
You want to allow your users to download files form a server runing the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability? A HTML B TCP C FTP D HTTP E IP F TFTP
C FTP
Which of the following protocols stores email on the mail server and gives a choice to download mail or keep it on the server? A NTP B SMTP C POP3 D IMAP4
D IMAP4
Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server? A POP3 B SMTP C FTP D SPC E SNMP
A POP3
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? A TCP B ARP C ICMP D IGMP E DHCP F IP
C ICMP
You are asked to recommend an email retieval protocol for a company’s sales team. The sales team needs to access email from various locations and possibly different computers. the sales team does not want to worry about transferring email messages or files back and forth between these computers.
Which email protocol was designed for this purpose?
A SMTP
B POP4
C POP3
D MFTP
F IMAP
F IMAP
Internet Message Access Protocol
The data link layer of the OSI model is compromised of two sublayers. Waht are they? A LAT B DLC C MAC D SAN E LLC
C MAC
E LLC
In the OSI model, which of the following functions are performed at the Application layer? Select all that apply.
A Data translation
B Conversion identification
C Enabling communication between network clients and services
D Integration of network functionality into the host operating system
C Enabling communication between network clients and services
D Integration of network functionality into the host operating system
Which three of the following functions are performed by the OSI Transport layer?
A Reliable message delivery
B Consistent data formatting between disimiliar systems
C Control media access, logical topology, and device identification
D Format packets for delivery
E Path indentification and selection
F End-to-end flow control
G Data segmentation and reassembly
A Reliable message delivery
F End-to-end flow control
G Data segmentation and reassembly
You are an application developer and are writing a program to exchange video files through TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability? A TFPT B RIP C FTP D UDP E TCP F IP
E TCP
Which of the following are functions of the MAC sublayer? Select two.
A Creating routing tables based on MAC addresses
B Defining a unique hardware address for each device on the network
C Letting devices on the network have access to the LAN
D Mapping hardware addresses to link-layer addresses
B Defining a unique hardware address for each device on the network
C Letting devices on the network have access to the LAN
In the OSI model, what is the primary function of the Network Layer?
A Allows applications to establish, use, and end a connection
B Routes messages between networks
C Transmits data frames
D Ensures that packets are delivered with no loss or duplication
B Routes messages between networks
The UDP tansport protocol provides which of the following features? select all that apply. A Gauranteed delivery B Connectionless datagram services C Low overhead D Sequence numbers and acknowledgements
B Connectionless datagram services
C Low overhead
Which OSI model layer is responsible for guaranteeing reliable message delivery? A Application B Data link C Transport D Session
C Transport
Which of the following functions are performed at the Physical layer of the OSI model?
A Enablement of netowork services
B Movement of data across network cables
C Conversation identification
D Provision of an environment in which to run network applications
E Data translation
B Movement of data across network cables
What is the basic purpose of the OSI Physical Layer?
A Coordinates rules for managing network servers.
B Defines basic physical structures, such as disks.
C Coordinates rules for transmitting bits.
D Coordinates rules for routing packets.
C Coordinates rules for transmitting bits.
Which of the following tasks is associated with the Session layer? A Host ID number assignment B Acknowledge coordination C Transmission syncronization D Connection establishment
D Connection establishment
Which two of the following are included as part of Data Link layer specifications?
A Syncronizing individual bits as they are transmitted through the network.
B Identifying physical network devices.
C Compostion of elctrical signals as they pass through the transmissionmedium.
D Controlling how messgaes are propagated through the network.
B Identifying physical network devices.
D Controlling how messgaes are propagated through the network.
In the OSI model, which of the following functions are performed at the Presentation layer? select two.
A Maintain sperate client connections
B Specify data format
C Encrypt and compress
D Provide network services
E Transmit data frames
F Handle general network access, flow control, and rror recovery
B Specify data format
C Encrypt and compress
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes? A UDP B UCP C TCP D UDB
C TCP