Final Exam - 1 Flashcards
In a cable network environment, what is the name of the cable type that connects from the wall outlet to the modem?
USB
Lightning
None of these answers are correct.
Coaxial
Coaxial
What are the benefits of a DSL network over the previous method known as dial-up?
- Having much higher network speeds overall.
- All of these answers are correct.
- Much more stability in terms of network reliability.
- Being able to talk on the phone and surf the web at the same time.
Being able to talk on the phone and surf the web at the same time.
In WANs, which of the following is NOT a characteristic of mesh topology?
- Data transmissions are carried out via multiple routes
- All sites are connected to each other
- Implementation incurs high costs
- Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
Watching a YouTube video on the web is an example of which video-over-IP service?
Video conferencing
IPTV
TCP/IP
Streaming video
Streaming video
What type of video-over-IP service relies on two-way communication?
TV broadcast
IPTV
Video conferencing
Streaming video
Video conferencing
RTCP as a transport protocol doesn’t deliver any data. Instead, it focuses on _____.
Logistical transfer
Password acceptance
Wi-Fi controls
Quality control
Quality control
Which of the following is NOT a standard Wi-Fi communications standard?
802.11x
802.11n
802.11ac
802.11g
802.11x
How do signals travel between a GPS satellite and an on-the-ground GPS receiver?
- From the satellite to the receiver and back, but through a ground station
- Only from the satellite to the receiver
- From the satellite to a ground station and then from the ground station to the receiver
- From the satellite to the receiver and back
Only from the satellite to the receiver
Which two protocols are NOT backward compatible?
802.11a and 802.11ac
802.11a and 802.11b
802.11g and 802.11b
802.11g and 802.11ac
802.11a and 802.11b
How many servers does a typical client/server network have?
6
One for every three clients
At least one
As many as there are clients
At least one
Which of the following is a benefit of using three-tier network architecture relative to two-tier?
Increased security
All answers are correct
Increased performance
Greater flexibility
All answers are correct
In what way is a peer-to-peer network different from client/server networks?
- In peer-to-peer, tasks are allocated to only one member of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
- In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, only one client requests resources or services from the network.
- In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
- In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a very powerful computer does all of the processing.
- In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, a number of network clients or workstations request resources or services from the network.
In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
What is a backbone network?
a low capacity connectivity infrastructure that forms the backup link to the different sub networks connected to it
a high capacity connectivity infrastructure that forms the main link to the different sub networks connected to it
the parallel backup network incorporated into enterprise designs
the infrastructure designed as a backup to the main network infrastructure
a high capacity connectivity infrastructure that forms the main link to the different sub networks connected to it
Padding data is required within an Ethernet frame to _____.
hold the Pad Mac Address
synchronize frame transmission
fulfill minimum field length requirement
initiate a transmission queue
fulfill minimum field length requirement
A wireless network for Internet access in a large building is typically connected in a _____ topology.
ring
mesh
logical
physical
mesh
CAT 3 and CAT 5 belong to which of the following cable categories?
Coaxial cable
Fiber optic cable
Unshielded twisted pair cable
Shielded twisted pair cable
Shielded twisted pair cable
Which of these statements is true?
- You can expect to get just as much throughput as you ask for
- You should rarely expect delays when you ask for data
- You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
- Data always travels the same speed on the network
You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
In reference to computers and the internet, what is bandwidth?
Bandwidth is how wide your data can get
Bandwidth is the actual speed of your data
Bandwidth is the theoretical speed of your data
Bandwidth is the speed of your data
Bandwidth is the theoretical speed of your data
IMAP is the vehicle by which _____.
- compatibility updates are synchronized between Outlook and other email servers.
- messages are moved, organized and manipulated between the mail server and the mail client application.
- client applications are moved, organized and manipulated between the mail server and the mail client application
- synchronization is achieved between email clients and ISPs.
messages are moved, organized and manipulated between the mail server and the mail client application.
In the SMTP server to server set up, the email clients serve to _____
- authorize SMTP commands
- generate protocol commands to the internet
- Receive/Send and queue messages between SMTP servers and clients
- authorize SMTP servers
Receive/Send and queue messages between SMTP servers and clients
IMAP can allow a user with multiple devices to _____.
access their emails simultaneously from any of the devices.
consolidate system updates on all devices.
access the protocol simultaneously from any of the devices.
synchronize playback of multimedia from all devices.
access their emails simultaneously from any of the devices.
What will happen if you enter the IP address 142.250.191.206 into your web browser?
Nothing, it is not possible to enter numbers
Google.com
Your anti-virus will flash a warning
An error will occur
Google.com
Which of the following statements is true?
Recursive name servers respond to queries from TLD name servers
Local DNS cache respond to queries from root servers
Recursive name servers respond to queries from authoritative servers
Authoritative name servers respond to queries from recursive name servers
Authoritative name servers respond to queries from recursive name servers
The organization that currently regulates and manages the Internet is _____.
IANA
ICANN
WTO
IETF
ICANN
At the ‘receiving’ computer, the transport layer provides input to which OSI layer?
The physical layer
The network layer
The session layer
The data link layer
The session layer
The presentation layer of the OSI model is responsible for integrating all data formats into what type of form?
Generalized and complete
Acceptable and compatible
Slow and accurate
Summarized and accurate
Acceptable and compatible
The unique identifier applicable to a specific network computer or node is the Network _____.
processor
address
protocol
tag
address
Internet of Things (IoT) differs from the Internet in that _____.
it is the medium through which devices communicate while the Internet is the framework
IoT uses hardware while the Internet uses software
it is proprietary devices only which connect to the internet while the internet is the gateway
It is the ability for every electronic device to connect via the internet while the Internet is the medium by which they connect
It is the ability for every electronic device to connect via the internet while the Internet is the medium by which they connect
A VLAN is defined as _____.
a very large Local Area Network
a volatile LAN
a logical implementation of a Wide area network
a logical implementation of a LAN
a logical implementation of a LAN
A specially designed server operating system can serve:
multiple power sources on its network
multiple hard drives on its system
multiple software to its systems
numerous concurrent clients connections
numerous concurrent clients connections
One example of network security is the usage of passwords to protect individual accounts and information. What common sense password rule is often ignored in this case?
- Making a password too short.
- Making the password completely unique, not simply recycling the same password with a simple change.
- Writing the password down and leaving it in the open.
- Making a password hard to guess and not using easy things such as a pet name or a family member’s birthday.
Writing the password down and leaving it in the open.
Which of the following is an unintentional threat to the security of computer networks?
Denial of Service (DoS) attacks
Computer viruses
Computer failures
Sabotage
Theft of Data
Computer failures
Which word below best describes a flaw in network security which permits an assault on network resources.
Instability
Incompatibility
Unreliability
Vulnerability
Vulnerability
_____ represents a standard IP address.
10101000.01001010.0001001.11111111
10101000.01001010.00000101.11100111
1010000.01001010.00011001.11111111
10101000.01001010.00011001.1111111
10101000.01001010.00000101.11100111
In terms of computer networking, what is a router?
- A computer networking device that allows for computers and other devices to be connected together in a general area.
- A tool used to prevent computer viruses from accessing a computer.
- A device that is used to assist electricians in routing wires and other cables through a wall.
- A device that allows for several individual networks to be connected to each other.
A device that allows for several individual networks to be connected to each other.
How could a non-routable device send or receive messages on the Internet?
Restrict IP range to 10.0.0.0 -> 10.255.255.255
Use Class D IP address values
Use network address translation
Non-routable devices are not allowed any Internet access
Use network address translation
What makes Mosh an alternative to SSH?
Mosh is more secure than SSH.
Mosh can reconnect if a wireless connection gets interrupted.
Mosh is faster than SSH.
Mosh is easier to set up than SSH.
Mosh can reconnect if a wireless connection gets interrupted
What main use does Telnet have in modern IT?
Telnet is often used for embedded devices.
Telnet offers remote access to Intranet resources.
Telnet is used for secure access to remote computers.
Telnet is used for fun things like games.
Telnet is often used for embedded devices.
SSH client and server utilities are found on most operating systems by default, except _____.
Unix
Linux
Microsoft Windows
MAC OS X
Microsoft Windows
Of the options listed, which is the most used WAN (Wide Area Network) carrier?
Dark Fiber
Dedicated Lines
Frame Relay
MPLS
MPLS
In order for voice packets to be routed correctly through the Internet, they have to have detailed what?
Labels
Zipcodes
Dogtags
Instruction sheets
Labels
Which of the following technologies use microwaves?
None of these use microwaves
Infrared
FM Radio
Cellular
Cellular
What is the benefit of the client-server model?
Redundant resources
It is faster than direct connection of clients
Ease of management
There are many servers to choose from
Ease of management
In a _____ topology network, all the devices are connected back to a central hub or switch.
bus
star
mesh
logical
star
In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?
CAT7
CAT4
CAT5e
CAT5
CAT5e
POP is within what layer of the OSI Model?
layer 1
layer 3
layer 7
layer 2
layer 7
An IPv4 address contains _____ digits in _____ sets separated by a _____.
4; 3; comma
3, 4 ; comma
3; 4; period
4; 3; period
3; 4; period
In the OSI physical layer, data is transmitted in the form of _____.
both optical and electromagnetic signals
electromagnetic signals
infrared rays
optical signals
both optical and electromagnetic signals
What is Ethernet?
A type of network card
An early version of the Internet
A standard for computer networking technologies
A type of computer cable
A standard for computer networking technologies
A good administrator _____ the needs of security in the organization and the capabilities of the employees in the organization.
talks about
balances
considers
ignores
balances
Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.
duplicate concurrent connections to the low level backbone routers
duplicate concurrent connections to the high level backbone routers
duplicate concurrent switches to the high level backbone routers
single concurrent switches to the high level backbone routers
duplicate concurrent connections to the high level backbone routers
Four types of backbone networks are _____.
Serial, Distributed, Collapsed and Parallel networks
Serial, Collapsed, Distributed and Paramount networks
Series, Collapsed, Distributed and Parallel networks
Distributed, Collage, Series and Parallel networks
Serial, Distributed, Collapsed and Parallel networks
Which of these statements is FALSE?
The network layer controls the conversations between different computers.
The network layer does accounting.
The network layer helps transmit data between hosts.
The network layer is responsible for determining the shortest path for a packet of data.
The network layer controls the conversations between different computers..
All of the following are functions of the Data Link Layer except
provide a well defined interface to the Network Layer
regulate the flow of data
deal with transmission errors
stop all bad files from passing to the Physical Layer
stop all bad files from passing to the Physical Layer
Which of the following is true about half-duplex mode?
Data is transmitted in both directions at the same time.
Data is transmitted in one direction only.
Data is not transmitted.
Data is transmitted in both directions but not at the same time.
Data is transmitted in both directions but not at the same time.
A data measurement unit that contains 8 bits of information is known as which of the following?
Byte
Kilobyte
Block
Petabyte
Byte
What is a unique downside that consumers face with a traditional cable network connection versus that of DSL?
The cost per month of service is higher.
None of these answers are correct.
Surrounding neighbors can affect the network bandwidth during peak hours.
Overall network stability and reliability are lower.
Surrounding neighbors can affect the network bandwidth during peak hours.
Which type of network transmission mode transmits data in both directions simultaneously?
Full-Triplex
Metachronous
Asynchronous
Synchronous
Synchronous
Which component involves processes that are completed in a task-oriented manner?
Machine learning
SD-WAN
Automation
AI
Automation
Which computer network, built by a business, is used to interconnect its various company sites in order to share computer resources?
EPN
PAN
WAN
MAN
EPN
A computer network is a set of connected
cables
routers
computers
topologies
computers
In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.
experiences
routers
permissions
networks
permissions
When two systems first connect using SSH they exchange their _____ keys with each other.
public
decoder
private
car
public
What are some of the tunneling protocols that VPNs use?
IPsec and L2TP
AES and MD5
HTTP and FTP
Blowfish and Twofish
IPsec and L2TP
In a typical mail operation with POP, a message is pulled down from the remote server and:
The AOL voice says ‘You’ve got mail!’
A buzzer is activated in the mail client’s Bluetooth headset
The message is stored on the recipient’s device and is deleted from the remote server
A reply is automatically sent the to the sender
The message is stored on the recipient’s device and is deleted from the remote server
Which device provides access control functionality between networks?
A Network Interface Card
A router
A printer
A switch
A router
What entity is responsible for allowing access to the WAN?
The consumer
None of the answers are correct
The ISP
The client
The ISP
Which of these statements is NOT true about a NIC?
An Ethernet connection is the most common.
A NIC only allows for either a wired or wireless connection, not both.
Another term for it is LAN adapter.
It is often built into a computer’s motherboard.
A NIC only allows for either a wired or wireless connection, not both.
What category of LAN card do laptops typically support?
A wireless card only.
Laptops don’t need LAN cards.
A wired card only.
Both wired and wireless cards.
Both wired and wireless cards.
DNS servers use _____ servers to help resolve IP addresses to Domain Names
IP servers
Authoritative servers
Caching servers
Authentication servers
Authoritative servers
Which of these is not one of TCP/IP’s five protocol layers?
Physical layer
Application/process layer
Network interface layer
Transmission
Transmission
Which of the following statements is true when a user first makes a DNS query by typing the domain name into the web browser?
A DNS query answer is returned from the authoritative servers
The local DNS cache is queried
A request is sent to an ISP recursive server
A request is sent to the respective root nameservers
The local DNS cache is queried
Which of the following statements is true?
MAC addresses can route data packets over the internet independent of IP addresses.
MAC and IP addresses can both work independently depending on the environment.
MAC and IP addresses need to work in parallel for effective communication.
NICs are hardwired with IP and MAC addresses.
MAC and IP addresses need to work in parallel for effective communication.
Why is it necessary for computer systems (hosts) to have a hostname or domain name?
- It is necessary because it is an international standard which must be followed.
- It is necessary because it differentiates it from other people’s computer systems.
- It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
- It is necessary because every device has a name and so this should not be different.
It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.