Chapter 1 Flashcards
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? A) Layer 4 B) Layer 5 C) Layer 6 D) Layer 7
D) Layer 7
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? A) Application Layer B) Presentation Layer C) Session Layer D) Transport Layer
C) Session Layer
What is the name of the protocol data unit (PDU) of the Data Link layer? A) Packet B) Data C) Bit D) Frame
D) Frame
The segment or datagram protocol data unit exists at what layer of the OSI model? A) Application Layer B) Transport Layer C) Network Layer D) Data Link Layer
B) Transport Layer
In what network topology are devices daisy-chained together in a single line? A) Bus Topology B) Star Topology C) Star Bus Topology D) Ring Topology
A) Bus Topology
What physical network topology consists of all connected devices connecting to one central device, such as a switch? A) Bus Topology B) Ring Topology C) Hub Topology D) Star Topology
D) Star Topology
The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below? A) Demarc B) Last Mile C) Local Loop D) Point of No Return
A) Demarc
The proper handling procedures for substances such as chemical solvents are typically outlined in which of the following options?
A) Toxic Chemical Safety Procedure (TCSP)
B) Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
C) Environmental Chemical Hazard Sheet (ECHS)
D) Material Safety Data Sheet (MSDS)
D) Material Safety Data Sheet (MSDS)
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? A) Fail-open B) Fail-close C) Fail-tolerant D) Fail-dynamic
B) Fail-close
A standard network switch operates at what layer of the OSI model? A) Layer 5 B) Layer 2 C) Layer 3 D) Layer 7
B) Layer 2
Which of the following is not one of the disadvantages of peer-to-peer networks?
A) They lack scalability
B) They are not necessarily secure
C) They are impractical for connecting large numbers of computers
D) They centralize user account logins
D) They centralize user account logins
Using the same network to deliver multiple types of communications services, such as video, voice, and fax is known as: A) Multi-faceted networking B) Convergence C) Multiplexing D) Unified Networking
B) Convergence
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? A) Application B) Session C) Transport D) Network
D) Network
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read: A) Application B) Presentation C) Session D) Transport
B) Presentation
If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as: A) De-encapsulation B) Fragmentation C) Packet Splitting D) Framing
B) Fragmentation
The process of adding a header to the data inherited from the layer above is called what option below? A) Segmenting B) Encapsulation C) Fragmenting D) Appending
B) Encapsulation
When using a Windows domain, what is the domain-level account for each user known as? A) Global Account B) Universal Account C) Domain Token D) Principle Name
A) Global Account
What mail protocol is used to send mail messages to a server? A) POP3 B) IMAP4 C) SMTP D) HTTPS
C) SMTP
What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event? A) Multicast Distribution B) Multi-point Communication C) Spread Packet Delivery D) Broadcast Transmission
A) Multicast Distribution
Any computer or device on a network that can be addressed on the local network is referred to as a: A) Host B) Node C) Target D) Subject
B) Node
What are two encryption protocols commonly used with the Hypertext Transfer Protocol? A) SSH B) TLS C) SSL D) AES
B) TLS
C) SSL
What two mail delivery protocols below can be used by a client application to receive e-mail from a server? A) POP3 B) SMTP C) MGET D) IMAP4
A) POP3
D) IMAP4
Which two protocols can be used to gain remote access specifically to a server's command line interface, securely an unsecurely? A) Telnet B) SSH C) Remote Desktop D) VNC
A) Telnet
B) SSH
What are the two main Transport Layer protocols? A) IPX B) SPC C) TCP D) UDP
C) TCP
D) UDP
Static electricity can cause what two types of damage in electronic components? A) Electromagnetic Failure B) Catastrophic Failure C) Upset Failure D) Polarity Failure
B) Catastrophic failure
C) Upset failure
The process of adding a header to the data inherited from the layer above is called what option below?
a. encapsulation
b. segmenting
c. appending
d. fragmenting
a. encapsulation
Iterative Queries?
Queries from a local server does not require resolution.
What is File Transfer protocol (FTP)?
Fire Transfer Protocol
Transfers files between computers not encrypted
What are the 7 Layers of the OSI model
- Application
- Presentation
- Session
- Transport
- Network
- Data
- Physical
What does OSI stand for?
Operating System Interconnection
What is SMTP
Simple Mail Transfer Protocol
What is WAN
Wide Area Network
Group of LAN’s wide geographical area
What is MAN
Metropolitan Area Network
What does HTTP stand for
Hypertext Transfer Protocol
Primary protocol used by web servers
What is PAN
Personnel Area Network
What does NOS stand for
Network Operating System