Domain 2 Flashcards
Which of the following topologies is most widely used today because of its scalability and fault tolerance?
a) Ring Topology
b) Loop Topology
c) Star topology
d) Bus Topology
Star topology
When examining an IP packet header, at which byte would find the Protocol field?
a) Byte 11.
b) Byte 9
c) Byte 8
d) Byte 10
Byte 9
Which of the following statements is FALSE?
a) 802.11b supports up to 2.4 Mbps at 11 GHz
b) 802.11a supports up to 54 Mbps at 5 GHz
c) 802.11g supports up to 54 Mbps at 2.4 GHz
d) 802.11b supports up to 11 Mbps at 2.4 GHz
802.11b supports up to 2.4 Mbps at 11 GHz
Which of the following is NOT a WAN communication technology?
a) Token Ring
b) Frame relay
c) Voice over IP
d) Dedicated lines
Token Ring
If I were implementing a 16 Mbps network to the exact specifications provided to me, which cable category would be most appropriate to use?
a) Category 4
b) Category 5
c) Category 3
d) Category 2
Category 4
Which network component should be used when you are concerned with internal network sniffing?
a) A network hub
b) A network bridge
c) A network hop
d) A network switch
A network switch
Which of the following is the correct binary representation of the decimal number 252?
a) 11111110
b) 11111100
c) 11101110
d) 01111111
11111100
Which of the following network layer protocols provides authentication and confidentiality services by encapsulating standard IP communication, independent of the application generating the traffic?
a) SET
b) PEM
c) IPSec
d) S/MIME
IPSec
Which of the following is the fundamental protocol of the internet?
a) TCP
b) UDP
c) HTTP
d) IP
IP
Which of the following binary, decimal, protocol combinations is correct?
a) 00000000, 0, ICMP
b) 00100001, 17, UDP
c) 00000011,6, TCP
d) 00000110, 6, TCP
e) 11110001, 1, ICMP
00000110, 6, TCP
Which of the following allows you to uniquely identify a complete connection among all other connections on the internet?
a) A socket
b) A source and destination IP address
c) A source and destination port number
d) A hostname
A socket
When you encounter two NICs with the same embedded MAC address, what should you do?
a) Select a different MAC address from those available.
b) Increment one of the duplicate MAC addresses by 2.
c) You will not encounter this situation, MAC addresses are unique.
d) Reset both NICs in order to resolve the MAC address conflict.
You will not encounter this situation, MAC addresses are unique
Which of the following layers of the Open Systems Interconnect (OSI) model interacts with your information and prepares it to be transmitted across the network?
a) Network Layer
b) Transport Layer
c) Presentation Layer
d) Application Layer
Transport Layer
What is the current, widespread implemented solution to network address congestion and conservation?
a) IPv4
b) CIDR
c) IPv5
d) IPv7
CIDR
Which of the following is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination?
a) Ping
b) TCP
c) Tripwire
d) Traceroute
Traceroute