Chapter 1 - In-Class Quiz, Homework, Chapter Review, & Lab Questions Flashcards

In-Class Quiz - 10 questions Homework - 15 questions Chapter 1 Review - 20 questions Lab 1 (OSI Model) - 17 questions

1
Q

Which of the following protocols is used by a client to send an email message?

A. HTTP
B. SMTP
C. FTP
D. RDP

A

SMTP - The Simple Mail Transfer Protocol is a communication protocol for electronic mail transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When Windows Server controls network access to a group of computers, this logical group is called which of the following?

A. workgroup
B. homegroup
C. domain
D. access group

A

domain - A Windows domain is a form of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database located on one or more clusters of central computers known as domain controllers. Authentication takes place on domain controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: A client / server network is the simplest network model.

A

False - The simplest network is called peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _____________ is a central conduit that connects the segments (pieces) of a network.

A

backbone - A backbone or core is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network that is larger than a LAN and connects clients and servers from multiple buildings is known as which of the following?

A. WAN
B. MAN
C. PAN
D. LAN

A

MAN - metropolitan area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the seventh layer of the OSI model?

A. Physical layer
B. Transport layer
C. Application layer
D. Session layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The name given to a group of bits as it moves from one layer of the OSI model to the next is which of the following?

A. frame
B. packet
C. segment
D. protocol data unit (PDU)

A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocols in the ________ layer accept data from the Session layer and manage end-to-end delivery of data.

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: The IP (Internet Protocol) operates in the Transport layer.

A

False - It’s the network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The least intelligent switches operated at which layer of the OSI model?

A. Physical layer
B. Transport layer
C. Session layer
D. Data Link layer

A

Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

A. fail-open
B. fail-close
C. fail-tolerant
D. fail-oriented

A

fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

A. Application
B. Session
C. Transport
D. Network

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

A. Layer 4
B. Layer 5
C. Layer 6
D. Layer 7

A

Layer 7 - Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

A. Active Directory Federated Users (AD FU)
B. Active Directory Domain Services (AD DS)
C. Automated Directory Network Services (AD NS)
D. Windows Named Resource Services (WN RS)

A

Active Directory Domain Services (AD DS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

A. The Presentation layer describes the interface between two applications, each on separate computers.

B. The Presentation layer is responsible for reformatting, compressing, and / or encrypting data in a way that the application on the receiving end can read.

C. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don’t arrive intact at the receiving application.

D. The Presentation layer is responsible for transporting Application layer payloads from one application to another.

A

The Presentation layer is responsible for reformatting, compressing, and / or encrypting data in a way that the application on the receiving end can read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

A. Application
B. Network
C. Physical
D. Data Link

A

Physical layer

17
Q

The Data Link Layer utilizes what name for its protocol data unit (PDU)?

A. packet
B. data
C. bit
D. frame

A

frame

18
Q

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

A. File Transfer Protocol (FTP)
B. Secure Sockets Layer (SSL)
C. Secure Shell (SSH)
D. Remote Desktop Protocol (RDP)

A

Remote Desktop Protocol (RDP)

19
Q

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

A. Toxic Chemical Safety Procedure (TCSP)

B. Dangerous and Hazardous Waste Disposal Sheet (DHWDS)

C. Environmental Chemical Hazard Sheet (ECHS)

D. Material Safety Data Sheet (MSDS)

A

Material Safety Data Sheet (MSDS)

20
Q

What federal agency is charged with safety and health in the workplace?

A. Occupational Safety and Health Administration (OSHA)
B. Workplace Safety and Hazard Administration (WSHA)
C. Office Safety and Standards Department (OSSD)
D. Hazardous Materials and Safety Management (HMSM)

A

Occupational Safety and Health Administration (OSHA)

21
Q

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?

A. MAC address
B. IP address
C. port address
D. autonomous system address

A

IP address

22
Q

What is the most popular web server application?

A. Microsoft Internet Information Services
B. NGINX
C. Lighttpd
D. Apache

A

Apache

23
Q

What mail protocol is used to send mail messages to a server?

A. POP3
B. IMAP4
C. SMTP
D. HTTPS

A

SMTP

24
Q

What statement accurately reflects what occurs when a message is too large to transport on a network?

A. The message is discarded and must be sent again.

B. The message is sent anyway, and is received by the destination as garbage data.

C. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

D. An ICMP error is generated, and the application must reformat the data for transmission.

A

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

25
Q

Which of the following is an example of encapsulation?

A. The addition of a header to data inherited from the layer above in the OSI model.

B. The subtraction of a header from data inherited from the layer below in the OSI model.

C. The modification of headers from a higher layer in the OSI model.

D. The addition of a trailer to data inherited from the layer above in the OSI model.

A

The addition of a trailer to data inherited from the layer above in the OSI model.