Chapter 1: Introduction to Networking Flashcards

1
Q

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

a. fail-close
b. fail-oriented
c. fail-open
d. fail-tolerant

A

fail-open

A policy in which all exit doors for a building stay unlocked during a fire is an example of a fail-open policy. In a fail-open policy, the system or security mechanism allows access or doors to remain open in the event of a failure or emergency situation, such as a fire, to ensure that people can quickly exit the building for their safety. This approach prioritizes safety over security during emergencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

At what layer of the OSI model do the IP, ICMP, ARP protocols operate?

a. Network
b. Application
c. Transport
d. Session

A

Network

The IP (Internet Protocol), ICMP (Internet Control Message Protocol), and ARP (Address Resolution Protocol) protocols operate at the Network Layer of the OSI model. The Network Layer is Layer 3 in the OSI model and is responsible for routing packets between different networks and ensuring the delivery of packets from the source to the destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTP, IMAp4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

a. Layer 6
b. Layer 5
c. Layer 7
d. Layer 4

A

Layer 7

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at Layer 7, which is the Application Layer of the OSI model. The Application Layer deals with end-user communication and provides various application-level services, including network applications, file transfer, and remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a domain, the process of allowing a user to sign on the network from any computer on the network and get access to resources is managed by what service?

a. Automated Directory Network Services (AD NS)

b. Windows Named Resources Services (WN RS)

c. Active Directory Federated USers (AD FU)

d. Active Directory Domain Services (AD DS)

A

d. Active Directory Domain Services (AD DS)

The process of allowing a user to sign on the network from any computer on the network and get access to resources is managed by Active Directory Domain Services (AD DS) in a Windows network environment. Active Directory is a directory service provided by Microsoft for managing users, computers, and resources on a network, and it facilitates centralized authentication and authorization, allowing users to access network resources from various computers within the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the presentation layer?

a. The presentation layer describes the interface between two applications, each on separate computers.

b. The presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application receiving it can read.

c. The presentation layer is responsible for transmitting application layer payloads from one application to another.

d. The presentation layer is responsible for describing how data between applications is synced and recovered if messages do not arrive intact at the receiving application.

A

b. The presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application receiving it can read.

The presentation layer primarily deals with data formatting and transformation, ensuring that data sent from one application can be understood by the receiving application, including tasks such as data encryption, compression, and character encoding. It doesn’t handle synchronization and recovery or the interface between applications; those responsibilities fall under other layers of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

a. Physical
b. Data Link
c. Network
d. Application

A

Physical

The Physical Layer deals with the actual hardware components and the transmission of raw bits over a physical medium (e.g., cables, network interface cards). In many discussions and implementations of the TCP/IP model, the Physical Layer is often assumed to be in place and functioning correctly, so it’s not always explicitly mentioned or considered in detail when discussing networking protocols and configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Data Link Layer utilizes what name for its protocol data unit (PDU)?

a. data
b. packet
c. frame
d. bit

A

Frame

The Data Link Layer utilizes the term “frame” for its protocol data unit (PDU). A frame is a specific unit of data that includes both the data to be transmitted and control information necessary for reliable communication at the data link layer. Frames are used to encapsulate packets and add necessary information like source and destination addresses, error checking, and synchronization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

a. Secure Sockets Layer (SSL)
b. File Transfer Protocol (FTP)
c. Remote Desktop Protocol (RDP)
d. Secure Shell (SSH)

A

Remote Desktop Protocol (RDP)

The Windows Remote Desktop application utilizes the Remote Desktop Protocol (RDP) to provide secure and encrypted transmissions for remote desktop access. RDP is specifically designed for remote desktop and application sharing, and it includes encryption to protect the data being transmitted between the remote and host computers. While SSL and SSH are also used for secure communications, they are not the protocols used by Windows Remote Desktop for remote access. FTP, on the other hand, is primarily used for file transfer and doesn’t provide the same level of remote desktop functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

a. Toxic Chemical Safety Procedure (TCSP)

b. Environmental Chemical Hazard Sheet (ECHS)

c. Dangerous and Hazardous Waste Disposal Sheet (DHWDS)

d. Material Safety Data Sheet (MSDS)

A

Material Safety Data Sheet (MSDS)

The proper handling procedures for substances such as chemical solvents are typically outlined in a Material Safety Data Sheet (MSDS), which is also sometimes referred to as a Safety Data Sheet (SDS). These sheets provide detailed information about the properties, hazards, safe handling, storage, and disposal of chemicals and substances. MSDS/SDS sheets are an essential resource for ensuring the safe use and management of hazardous materials in various settings, including laboratories, workplaces, and industrial environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What federal agency is charged with safety and health in the workplace?

a. HMSM
b. WSHA
c. OSHA
d. OSSD

A

OSHA

The federal agency charged with safety and health in the workplace in the United States is the Occupational Safety and Health Administration (OSHA). OSHA is responsible for setting and enforcing workplace safety and health regulations to protect workers from hazards on the job. It establishes standards, conducts inspections, and provides guidance to ensure safe working conditions across a wide range of industries and workplaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is assigned to each node on a network, which is then used by the Network Layer to uniquely identify the node?

a. IP address
b. autonomous system address
c. port address
d. MAC address

A

IP address

Each node on a network is assigned an IP address (Internet Protocol address), which is then used by the Network Layer to uniquely identify the node within a given network. IP addresses are essential for routing packets of data between devices on a network and across the internet. They help ensure that data reaches its intended destination by specifying where it should be delivered based on the network and host portion of the IP address. In contrast, MAC addresses (Media Access Control addresses) are used at the Data Link Layer and are more specific to individual network interface cards (NICs) rather than entire nodes or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the most popular web server application?

Microsoft Internet Information Services
Lighttpd
Apache
NGINX

A

Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What mail protocol issued to send mail messages to server?

IMAP4
HTTPS
POP3
SMTP

A

SMTP

The mail protocol used to send mail messages to a server is SMTP (Simple Mail Transfer Protocol). SMTP is responsible for sending outgoing emails from a client (such as an email application or client) to an email server (outgoing mail server). It is used for the transmission of email messages between servers and plays a crucial role in the email communication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What statement accurately reflects what occurs when a message is too late to transport on a network?

a. The message is sent anyway and is received by the department as garbage data

b. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

c. The message is discarded and must be sent again.

d. An ICMP error is generated, and the application must reformat the data for transmission.

A

b. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an example of encapsulation?

a. The modification of headers forms a higher layer in the OSI model.

b. The addition of a trailer to the data inherited from the layer above in the OSI model

c. The addition of a header to data inherited from the layer above in the OSI model

d. The subtraction of a header for data inherited from the layer below in the OSI model

A

c. The addition of a header to data inherited from the layer above in the OSI
model.

Encapsulation involves adding a header to the data received from the layer above as it moves down the OSI model layers. This process occurs as data is prepared for transmission over the network. The header contains essential information for routing and handling the data at each layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component and can cause intermittent errors?

a. catastrophic failures

b. interrupting failures

c. temporary failures

d. upset failures

A

upset failure

When dealing with static electricity, the kind of failure caused by static discharge that shortens the life of a component and can cause intermittent errors is often referred to as “upset failures” or “soft failures.” These failures are characterized by the component temporarily malfunctioning or experiencing errors but not completely failing in a catastrophic manner. Upset failures can occur due to the discharge of static electricity or other transient electrical events, and they can sometimes be resolved by power cycling or resetting the affected component. However, repeated upset failures can lead to permanent damage or reduced component lifespan.

17
Q

What occurs if a network layer protocol is aware that a packet is larger than the maximum size its network?

a. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination.

b. The protocol will send an ICMP message to the destination, requiring a larger packet size.

c. The packet will be dropped silently, requiring the communication application to try again.

d. The pack will be divided into smaller packs using fragmentation.

A

The pack will be divided into smaller packs using fragmentation.

Packet fragmentation is the process of breaking a large packet into smaller fragments that can be transmitted across a network and reassembled by the receiving end. Fragmentation allows large packets to traverse networks with smaller Maximum Transmission Unit (MTU) sizes without loss of data. The receiving end reassembles the fragments into the original packet. Fragmentation is typically handled at the Network Layer (Layer 3) of the OSI model.

18
Q

What are the defining characteristics of a bus topology-based network?

a. Devices are directly attached to a network router, which is used to make decisions.

b. Devices are connected directly to a certified network device known as a network switch

c. Devices are connected to two adjacent devices and communication priority is granted by a token.

d. Devices are daisy-chained together in a single line.

A

d. Devices are daisy-chained together in a single line.

In a bus topology, devices are connected in a linear or bus-like fashion, where each device is connected to a common communication medium (the bus). This topology is relatively simple but has some limitations, such as the potential for signal interference and the difficulty of adding or removing devices without disrupting the entire network. Communication occurs by sending data onto the bus, and all devices on the network can see the data, but only the intended recipient processes it. There is no network switch or token-based communication as in other topologies like ring or token ring.

19
Q

In the TCIP model, what layer combines the responsibilities of the application, presentation, and session layers from the OSI model?

Link
Internet
Application
Transport

A

Application

In the OSI model, these three layers (Application, Presentation, and Session) are separate and distinct layers responsible for various aspects of network communication. However, in the TCP/IP model, they are grouped together into the Application Layer, which handles end-to-end communication between applications or services running on different devices. This consolidation simplifies the model while still encompassing the same functions as the three separate layers in the OSI model.

20
Q

At what layer of the OSI model does a network switch normally operate?

Layer 2
Layer 3
Layer 5
Layer 4

A

Layer 2

A network switch normally operates at Layer 2 of the OSI model, which is the Data Link Layer.
Switches are responsible for making forwarding decisions based on MAC addresses (Layer 2 addresses). They use MAC address tables to determine which port to forward data frames to, effectively creating a network segment and reducing collision domains. This is in contrast to routers, which operate at Layer 3 (the Network Layer) and make routing decisions based on IP addresses.