Chapter 1 Flashcards
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? A) Layer 4 B) Layer 5 C) Layer 6 D) Layer 7
D) Layer 7
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? A) Application Layer B) Presentation Layer C) Session Layer D) Transport Layer
C) Session Layer
What is the name of the protocol data unit (PDU) of the Data Link layer? A) Packet B) Data C) Bit D) Frame
D) Frame
The segment or datagram protocol data unit exists at what layer of the OSI model? A) Application Layer B) Transport Layer C) Network Layer D) Data Link Layer
B) Transport Layer
In what network topology are devices daisy-chained together in a single line? A) Bus Topology B) Star Topology C) Star Bus Topology D) Ring Topology
A) Bus Topology
What physical network topology consists of all connected devices connecting to one central device, such as a switch? A) Bus Topology B) Ring Topology C) Hub Topology D) Star Topology
D) Star Topology
The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below? A) Demarc B) Last Mile C) Local Loop D) Point of No Return
A) Demarc
The proper handling procedures for substances such as chemical solvents are typically outlined in which of the following options?
A) Toxic Chemical Safety Procedure (TCSP)
B) Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
C) Environmental Chemical Hazard Sheet (ECHS)
D) Material Safety Data Sheet (MSDS)
D) Material Safety Data Sheet (MSDS)
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? A) Fail-open B) Fail-close C) Fail-tolerant D) Fail-dynamic
B) Fail-close
A standard network switch operates at what layer of the OSI model? A) Layer 5 B) Layer 2 C) Layer 3 D) Layer 7
B) Layer 2
Which of the following is not one of the disadvantages of peer-to-peer networks?
A) They lack scalability
B) They are not necessarily secure
C) They are impractical for connecting large numbers of computers
D) They centralize user account logins
D) They centralize user account logins
Using the same network to deliver multiple types of communications services, such as video, voice, and fax is known as: A) Multi-faceted networking B) Convergence C) Multiplexing D) Unified Networking
B) Convergence
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? A) Application B) Session C) Transport D) Network
D) Network
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read: A) Application B) Presentation C) Session D) Transport
B) Presentation
If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as: A) De-encapsulation B) Fragmentation C) Packet Splitting D) Framing
B) Fragmentation
The process of adding a header to the data inherited from the layer above is called what option below? A) Segmenting B) Encapsulation C) Fragmenting D) Appending
B) Encapsulation
When using a Windows domain, what is the domain-level account for each user known as? A) Global Account B) Universal Account C) Domain Token D) Principle Name
A) Global Account
What mail protocol is used to send mail messages to a server? A) POP3 B) IMAP4 C) SMTP D) HTTPS
C) SMTP
What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event? A) Multicast Distribution B) Multi-point Communication C) Spread Packet Delivery D) Broadcast Transmission
A) Multicast Distribution
Any computer or device on a network that can be addressed on the local network is referred to as a: A) Host B) Node C) Target D) Subject
B) Node
What are two encryption protocols commonly used with the Hypertext Transfer Protocol? A) SSH B) TLS C) SSL D) AES
B) TLS
C) SSL
What two mail delivery protocols below can be used by a client application to receive e-mail from a server? A) POP3 B) SMTP C) MGET D) IMAP4
A) POP3
D) IMAP4
Which two protocols can be used to gain remote access specifically to a server's command line interface, securely an unsecurely? A) Telnet B) SSH C) Remote Desktop D) VNC
A) Telnet
B) SSH
What are the two main Transport Layer protocols? A) IPX B) SPC C) TCP D) UDP
C) TCP
D) UDP
Static electricity can cause what two types of damage in electronic components? A) Electromagnetic Failure B) Catastrophic Failure C) Upset Failure D) Polarity Failure
B) Catastrophic failure
C) Upset failure
The process of adding a header to the data inherited from the layer above is called what option below?
a. encapsulation
b. segmenting
c. appending
d. fragmenting
a. encapsulation
Iterative Queries?
Queries from a local server does not require resolution.
What is File Transfer protocol (FTP)?
Fire Transfer Protocol
Transfers files between computers not encrypted
What are the 7 Layers of the OSI model
- Application
- Presentation
- Session
- Transport
- Network
- Data
- Physical
What does OSI stand for?
Operating System Interconnection
What is SMTP
Simple Mail Transfer Protocol
What is WAN
Wide Area Network
Group of LAN’s wide geographical area
What is MAN
Metropolitan Area Network
What does HTTP stand for
Hypertext Transfer Protocol
Primary protocol used by web servers
What is PAN
Personnel Area Network
What does NOS stand for
Network Operating System
What is a switch
A device which receives incoming data from 1 port and redirects to another port.
What is a Host
A computer on a network
What is ring topology
Nodes are connected in a ring one node connects the 2 neighboring nodes
What is POP3
Post Office Protocol version 3
Email is downloaded to the client computer
What is a Router
A device that manages traffic between 2 or more networks.
What is the Client Server Model
Resources are managed by a central database via a server.
What is Telnet service
Allows administrators to remote in or control a computer
What is the definition of Topology
Describes how the parts of a whole work together.
What is a backbone
The central conduit of a network
What is the Peer to Peer model
Each computer controls access to its resources No Central Control
What is Physical Topology?
The network topology, applies to hardware
What is the Logical Topology
Refers to the software and how they access the network
What is IMAP4
Internet Message Access Protocol Version 4
Emails are stored on a server
What is layer 7
Application Layer
Include HTTP, SMTP, POP3, IMAP4, FTP
What is Payload
Data that is passed between applications and the operating system
What is the difference between a host and a node
A node is any addressable device connected to a network whereas the host is a more specific descriptor that refers to a networked general-purpose computers to a networked general-purpose computer.
What is layer 6
Presentation Layer
Responsible for reformatting/compressing and encrypting data
What is Layer 5
Session Layer
Describes how data is synced and recovered
What is API
Application Programing Interface
method an application uses when it makes a request of the operating system
What is Layer 4
Transport layer
responsible for transporting application payloads
2 main types of protocols used
TCP and UDP
What is UDP
User Datagram Protocol
communication protocol
best for live feed streaming
What is TCP
Transmission Control Protocol
AKA connection oriented protocol
slow, reliable
used for web browsing, email and File transfer
What is Layer 3
Network Layer
Internet Layer
moves messages from one node to another node
Principle protocol IP
What is Fragmentation?
Dividing large packets into smaller size for transmission
What is Layer 2
Data Link Layer
Switch or link Layer
interfaces with the physical hardware on the local network
What is MAC
Media access control address
What is Layer 1
Physical Layer
Simplistic layer
Sends bites
What is PDU
Protocol Data Unit
a group of bits
What is the name of the PDU for Layer 5,6,7
Payload or Data
What is the name of the PDU for Layer 4
Segment
What is the name of the PDU layer 3
Packet
What is the name of the PDU for Layer 2
Frame
What is the name of the PDU for Layer 1
Bit
What are the layers of the TCP/IP model
5 layers Application layer Transport layer Network layer Data link layer Physical layer.
What is convergence?
Using the same network to deliver multiple types of communication.
What does AD stand for?
Active Directory
access controlled by a central server
What layer of the OSI model describes how data between applications is synced and recovered if messages don’t arrive intact at the receiving application?
Layer 5, Session Layer
What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event?
multicast distribution
The device where a telecommunications service provider network ends and an organization’s network begins is referred to as what option
demarc or demarcation point
The process of adding a header to the data inherited from the layer above is called what option below?
encapsulation
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
Layer 7, Application Layer
The Application layer in the OSI model *describes the interface between two applications, each on separate computers.
A standard network switch operates at what layer of the OSI model?
Layer 2, the Data Link Layer
The least intelligent (nonprogrammable) switches, which are called Link Layer Switches or Layer 2 switches, operate at this layer.
Layer 2, the Data Link Layer
The least intelligent (nonprogrammable) switches, which are called Link Layer Switches or Layer 2 switches, operate at this layer.
SSL and TLS
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Remote Desktop
List three types of services a network might support that are considered part of unified communications or convergence?
Conversational Voice, Streaming Live audio/video, and streaming stored audio and voice.
Which session layer protocol is a streaming live video teleconference likely to use on the network?
UTP
A network consists of 10 computers, all running Windows 7 Professionals. One computer acts as a file server and serves up data to other computers on the network. Which networking model does the network use?
They have a peer-to-peer (P2P) network model
suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support that it could not support without the upgrade?
They now have a client-sever network model, which allows them to access their data from any computer on the network that was not possible on the P2P network model.
What are the fundamental distinctions between a node and a host?
A host is a computer/device that has an application or data that is needed by other electronics while a node is any computer/device that can be addressed on the network
What is a message called that is delivered by TCP? What is the message called that is delivered by UDP? At which layer do the two protocols work?
The two protocols work on the 4th layer/Transport layer. The connection for TCP is called a connection-oriented protocol; while in UDP it is called connection less protocol/best-effort protocol.
At the Network layer, what is a message called?
PDU
What is the primary protocol used at the Network layer?
TCP/IP
At the Network layer, what type of address is used to identify the receiving host?
IPV4
A computer is unable to access the network. When you check the LED lights near the computer’s network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the net- work adapter work?
Physical Layer, Data Link Layer
A user complains that he cannot access a particular Web site, although he is able to access other Web sites. At which layer of the OSI model should you begin trouble- shooting the problem?
Application Layer
A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you begin troubleshooting? Which OSI layer is responsible for not dropping the Skype connection?
Session Layer