Chapter 1: Introduction to Networking Flashcards
A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?
a. fail-close
b. fail-oriented
c. fail-open
d. fail-tolerant
fail-open
A policy in which all exit doors for a building stay unlocked during a fire is an example of a fail-open policy. In a fail-open policy, the system or security mechanism allows access or doors to remain open in the event of a failure or emergency situation, such as a fire, to ensure that people can quickly exit the building for their safety. This approach prioritizes safety over security during emergencies.
At what layer of the OSI model do the IP, ICMP, ARP protocols operate?
a. Network
b. Application
c. Transport
d. Session
Network
The IP (Internet Protocol), ICMP (Internet Control Message Protocol), and ARP (Address Resolution Protocol) protocols operate at the Network Layer of the OSI model. The Network Layer is Layer 3 in the OSI model and is responsible for routing packets between different networks and ensuring the delivery of packets from the source to the destination host.
HTTP, IMAp4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
a. Layer 6
b. Layer 5
c. Layer 7
d. Layer 4
Layer 7
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at Layer 7, which is the Application Layer of the OSI model. The Application Layer deals with end-user communication and provides various application-level services, including network applications, file transfer, and remote access.
In a domain, the process of allowing a user to sign on the network from any computer on the network and get access to resources is managed by what service?
a. Automated Directory Network Services (AD NS)
b. Windows Named Resources Services (WN RS)
c. Active Directory Federated USers (AD FU)
d. Active Directory Domain Services (AD DS)
d. Active Directory Domain Services (AD DS)
The process of allowing a user to sign on the network from any computer on the network and get access to resources is managed by Active Directory Domain Services (AD DS) in a Windows network environment. Active Directory is a directory service provided by Microsoft for managing users, computers, and resources on a network, and it facilitates centralized authentication and authorization, allowing users to access network resources from various computers within the domain.
In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the presentation layer?
a. The presentation layer describes the interface between two applications, each on separate computers.
b. The presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application receiving it can read.
c. The presentation layer is responsible for transmitting application layer payloads from one application to another.
d. The presentation layer is responsible for describing how data between applications is synced and recovered if messages do not arrive intact at the receiving application.
b. The presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application receiving it can read.
The presentation layer primarily deals with data formatting and transformation, ensuring that data sent from one application can be understood by the receiving application, including tasks such as data encryption, compression, and character encoding. It doesn’t handle synchronization and recovery or the interface between applications; those responsibilities fall under other layers of the OSI model.
In the TCP/IP model, what layer is considered so simple that it is ignored entirely?
a. Physical
b. Data Link
c. Network
d. Application
Physical
The Physical Layer deals with the actual hardware components and the transmission of raw bits over a physical medium (e.g., cables, network interface cards). In many discussions and implementations of the TCP/IP model, the Physical Layer is often assumed to be in place and functioning correctly, so it’s not always explicitly mentioned or considered in detail when discussing networking protocols and configurations.
The Data Link Layer utilizes what name for its protocol data unit (PDU)?
a. data
b. packet
c. frame
d. bit
Frame
The Data Link Layer utilizes the term “frame” for its protocol data unit (PDU). A frame is a specific unit of data that includes both the data to be transmitted and control information necessary for reliable communication at the data link layer. Frames are used to encapsulate packets and add necessary information like source and destination addresses, error checking, and synchronization.
The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?
a. Secure Sockets Layer (SSL)
b. File Transfer Protocol (FTP)
c. Remote Desktop Protocol (RDP)
d. Secure Shell (SSH)
Remote Desktop Protocol (RDP)
The Windows Remote Desktop application utilizes the Remote Desktop Protocol (RDP) to provide secure and encrypted transmissions for remote desktop access. RDP is specifically designed for remote desktop and application sharing, and it includes encryption to protect the data being transmitted between the remote and host computers. While SSL and SSH are also used for secure communications, they are not the protocols used by Windows Remote Desktop for remote access. FTP, on the other hand, is primarily used for file transfer and doesn’t provide the same level of remote desktop functionality.
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?
a. Toxic Chemical Safety Procedure (TCSP)
b. Environmental Chemical Hazard Sheet (ECHS)
c. Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
d. Material Safety Data Sheet (MSDS)
Material Safety Data Sheet (MSDS)
The proper handling procedures for substances such as chemical solvents are typically outlined in a Material Safety Data Sheet (MSDS), which is also sometimes referred to as a Safety Data Sheet (SDS). These sheets provide detailed information about the properties, hazards, safe handling, storage, and disposal of chemicals and substances. MSDS/SDS sheets are an essential resource for ensuring the safe use and management of hazardous materials in various settings, including laboratories, workplaces, and industrial environments.
What federal agency is charged with safety and health in the workplace?
a. HMSM
b. WSHA
c. OSHA
d. OSSD
OSHA
The federal agency charged with safety and health in the workplace in the United States is the Occupational Safety and Health Administration (OSHA). OSHA is responsible for setting and enforcing workplace safety and health regulations to protect workers from hazards on the job. It establishes standards, conducts inspections, and provides guidance to ensure safe working conditions across a wide range of industries and workplaces.
What is assigned to each node on a network, which is then used by the Network Layer to uniquely identify the node?
a. IP address
b. autonomous system address
c. port address
d. MAC address
IP address
Each node on a network is assigned an IP address (Internet Protocol address), which is then used by the Network Layer to uniquely identify the node within a given network. IP addresses are essential for routing packets of data between devices on a network and across the internet. They help ensure that data reaches its intended destination by specifying where it should be delivered based on the network and host portion of the IP address. In contrast, MAC addresses (Media Access Control addresses) are used at the Data Link Layer and are more specific to individual network interface cards (NICs) rather than entire nodes or devices
What is the most popular web server application?
Microsoft Internet Information Services
Lighttpd
Apache
NGINX
Apache
What mail protocol issued to send mail messages to server?
IMAP4
HTTPS
POP3
SMTP
SMTP
The mail protocol used to send mail messages to a server is SMTP (Simple Mail Transfer Protocol). SMTP is responsible for sending outgoing emails from a client (such as an email application or client) to an email server (outgoing mail server). It is used for the transmission of email messages between servers and plays a crucial role in the email communication process.
What statement accurately reflects what occurs when a message is too late to transport on a network?
a. The message is sent anyway and is received by the department as garbage data
b. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
c. The message is discarded and must be sent again.
d. An ICMP error is generated, and the application must reformat the data for transmission.
b. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
Which of the following is an example of encapsulation?
a. The modification of headers forms a higher layer in the OSI model.
b. The addition of a trailer to the data inherited from the layer above in the OSI model
c. The addition of a header to data inherited from the layer above in the OSI model
d. The subtraction of a header for data inherited from the layer below in the OSI model
c. The addition of a header to data inherited from the layer above in the OSI
model.
Encapsulation involves adding a header to the data received from the layer above as it moves down the OSI model layers. This process occurs as data is prepared for transmission over the network. The header contains essential information for routing and handling the data at each layer.