Final Exam - 1 Flashcards

1
Q

In a cable network environment, what is the name of the cable type that connects from the wall outlet to the modem?

USB

Lightning

None of these answers are correct.

Coaxial

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the benefits of a DSL network over the previous method known as dial-up?

  • Having much higher network speeds overall.
  • All of these answers are correct.
  • Much more stability in terms of network reliability.
  • Being able to talk on the phone and surf the web at the same time.
A

Being able to talk on the phone and surf the web at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In WANs, which of the following is NOT a characteristic of mesh topology?

  • Data transmissions are carried out via multiple routes
  • All sites are connected to each other
  • Implementation incurs high costs
  • Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
A

Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Watching a YouTube video on the web is an example of which video-over-IP service?

Video conferencing

IPTV

TCP/IP

Streaming video

A

Streaming video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of video-over-IP service relies on two-way communication?

TV broadcast

IPTV

Video conferencing

Streaming video

A

Video conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RTCP as a transport protocol doesn’t deliver any data. Instead, it focuses on _____.

Logistical transfer

Password acceptance

Wi-Fi controls

Quality control

A

Quality control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a standard Wi-Fi communications standard?

802.11x

802.11n

802.11ac

802.11g

A

802.11x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do signals travel between a GPS satellite and an on-the-ground GPS receiver?

  • From the satellite to the receiver and back, but through a ground station
  • Only from the satellite to the receiver
  • From the satellite to a ground station and then from the ground station to the receiver
  • From the satellite to the receiver and back
A

Only from the satellite to the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two protocols are NOT backward compatible?

802.11a and 802.11ac

802.11a and 802.11b

802.11g and 802.11b

802.11g and 802.11ac

A

802.11a and 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many servers does a typical client/server network have?

6
One for every three clients
At least one
As many as there are clients

A

At least one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a benefit of using three-tier network architecture relative to two-tier?

Increased security
All answers are correct
Increased performance
Greater flexibility

A

All answers are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what way is a peer-to-peer network different from client/server networks?

  • In peer-to-peer, tasks are allocated to only one member of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
  • In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, only one client requests resources or services from the network.
  • In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
  • In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a very powerful computer does all of the processing.
  • In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, a number of network clients or workstations request resources or services from the network.
A

In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a backbone network?

a low capacity connectivity infrastructure that forms the backup link to the different sub networks connected to it

a high capacity connectivity infrastructure that forms the main link to the different sub networks connected to it

the parallel backup network incorporated into enterprise designs

the infrastructure designed as a backup to the main network infrastructure

A

a high capacity connectivity infrastructure that forms the main link to the different sub networks connected to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Padding data is required within an Ethernet frame to _____.

hold the Pad Mac Address

synchronize frame transmission

fulfill minimum field length requirement

initiate a transmission queue

A

fulfill minimum field length requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A wireless network for Internet access in a large building is typically connected in a _____ topology.

ring
mesh
logical
physical

A

mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CAT 3 and CAT 5 belong to which of the following cable categories?

Coaxial cable

Fiber optic cable

Unshielded twisted pair cable

Shielded twisted pair cable

A

Shielded twisted pair cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of these statements is true?

  • You can expect to get just as much throughput as you ask for
  • You should rarely expect delays when you ask for data
  • You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
  • Data always travels the same speed on the network
A

You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In reference to computers and the internet, what is bandwidth?

Bandwidth is how wide your data can get

Bandwidth is the actual speed of your data

Bandwidth is the theoretical speed of your data

Bandwidth is the speed of your data

A

Bandwidth is the theoretical speed of your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IMAP is the vehicle by which _____.

  • compatibility updates are synchronized between Outlook and other email servers.
  • messages are moved, organized and manipulated between the mail server and the mail client application.
  • client applications are moved, organized and manipulated between the mail server and the mail client application
  • synchronization is achieved between email clients and ISPs.
A

messages are moved, organized and manipulated between the mail server and the mail client application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the SMTP server to server set up, the email clients serve to _____

  • authorize SMTP commands
  • generate protocol commands to the internet
  • Receive/Send and queue messages between SMTP servers and clients
  • authorize SMTP servers
A

Receive/Send and queue messages between SMTP servers and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IMAP can allow a user with multiple devices to _____.

access their emails simultaneously from any of the devices.

consolidate system updates on all devices.

access the protocol simultaneously from any of the devices.

synchronize playback of multimedia from all devices.

A

access their emails simultaneously from any of the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What will happen if you enter the IP address 142.250.191.206 into your web browser?

Nothing, it is not possible to enter numbers

Google.com

Your anti-virus will flash a warning

An error will occur

A

Google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following statements is true?

Recursive name servers respond to queries from TLD name servers

Local DNS cache respond to queries from root servers

Recursive name servers respond to queries from authoritative servers

Authoritative name servers respond to queries from recursive name servers

A

Authoritative name servers respond to queries from recursive name servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The organization that currently regulates and manages the Internet is _____.

IANA

ICANN

WTO

IETF

A

ICANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

At the ‘receiving’ computer, the transport layer provides input to which OSI layer?

The physical layer
The network layer
The session layer
The data link layer

A

The session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The presentation layer of the OSI model is responsible for integrating all data formats into what type of form?

Generalized and complete
Acceptable and compatible
Slow and accurate
Summarized and accurate

A

Acceptable and compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The unique identifier applicable to a specific network computer or node is the Network _____.

processor

address

protocol

tag

A

address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Internet of Things (IoT) differs from the Internet in that _____.

it is the medium through which devices communicate while the Internet is the framework

IoT uses hardware while the Internet uses software

it is proprietary devices only which connect to the internet while the internet is the gateway

It is the ability for every electronic device to connect via the internet while the Internet is the medium by which they connect

A

It is the ability for every electronic device to connect via the internet while the Internet is the medium by which they connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A VLAN is defined as _____.

a very large Local Area Network

a volatile LAN

a logical implementation of a Wide area network

a logical implementation of a LAN

A

a logical implementation of a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A specially designed server operating system can serve:

multiple power sources on its network

multiple hard drives on its system

multiple software to its systems

numerous concurrent clients connections

A

numerous concurrent clients connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

One example of network security is the usage of passwords to protect individual accounts and information. What common sense password rule is often ignored in this case?

  • Making a password too short.
  • Making the password completely unique, not simply recycling the same password with a simple change.
  • Writing the password down and leaving it in the open.
  • Making a password hard to guess and not using easy things such as a pet name or a family member’s birthday.
A

Writing the password down and leaving it in the open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is an unintentional threat to the security of computer networks?

Denial of Service (DoS) attacks

Computer viruses

Computer failures

Sabotage

Theft of Data

A

Computer failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which word below best describes a flaw in network security which permits an assault on network resources.

Instability
Incompatibility
Unreliability
Vulnerability

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

_____ represents a standard IP address.

10101000.01001010.0001001.11111111
10101000.01001010.00000101.11100111
1010000.01001010.00011001.11111111
10101000.01001010.00011001.1111111

A

10101000.01001010.00000101.11100111

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In terms of computer networking, what is a router?

  • A computer networking device that allows for computers and other devices to be connected together in a general area.
  • A tool used to prevent computer viruses from accessing a computer.
  • A device that is used to assist electricians in routing wires and other cables through a wall.
  • A device that allows for several individual networks to be connected to each other.
A

A device that allows for several individual networks to be connected to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How could a non-routable device send or receive messages on the Internet?

Restrict IP range to 10.0.0.0 -> 10.255.255.255

Use Class D IP address values

Use network address translation

Non-routable devices are not allowed any Internet access

A

Use network address translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What makes Mosh an alternative to SSH?

Mosh is more secure than SSH.
Mosh can reconnect if a wireless connection gets interrupted.
Mosh is faster than SSH.
Mosh is easier to set up than SSH.

A

Mosh can reconnect if a wireless connection gets interrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What main use does Telnet have in modern IT?

Telnet is often used for embedded devices.
Telnet offers remote access to Intranet resources.
Telnet is used for secure access to remote computers.
Telnet is used for fun things like games.

A

Telnet is often used for embedded devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SSH client and server utilities are found on most operating systems by default, except _____.

Unix
Linux
Microsoft Windows
MAC OS X

A

Microsoft Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Of the options listed, which is the most used WAN (Wide Area Network) carrier?

Dark Fiber
Dedicated Lines
Frame Relay
MPLS

A

MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

In order for voice packets to be routed correctly through the Internet, they have to have detailed what?

Labels
Zipcodes
Dogtags
Instruction sheets

A

Labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following technologies use microwaves?

None of these use microwaves

Infrared

FM Radio

Cellular

A

Cellular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the benefit of the client-server model?

Redundant resources
It is faster than direct connection of clients
Ease of management
There are many servers to choose from

A

Ease of management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

In a _____ topology network, all the devices are connected back to a central hub or switch.

bus
star
mesh
logical

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?

CAT7

CAT4

CAT5e

CAT5

A

CAT5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

POP is within what layer of the OSI Model?

layer 1
layer 3
layer 7
layer 2

A

layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

An IPv4 address contains _____ digits in _____ sets separated by a _____.

4; 3; comma

3, 4 ; comma

3; 4; period

4; 3; period

A

3; 4; period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

In the OSI physical layer, data is transmitted in the form of _____.

both optical and electromagnetic signals

electromagnetic signals

infrared rays

optical signals

A

both optical and electromagnetic signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is Ethernet?

A type of network card
An early version of the Internet
A standard for computer networking technologies
A type of computer cable

A

A standard for computer networking technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A good administrator _____ the needs of security in the organization and the capabilities of the employees in the organization.

talks about
balances
considers
ignores

A

balances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.

duplicate concurrent connections to the low level backbone routers

duplicate concurrent connections to the high level backbone routers

duplicate concurrent switches to the high level backbone routers

single concurrent switches to the high level backbone routers

A

duplicate concurrent connections to the high level backbone routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Four types of backbone networks are _____.

Serial, Distributed, Collapsed and Parallel networks

Serial, Collapsed, Distributed and Paramount networks

Series, Collapsed, Distributed and Parallel networks

Distributed, Collage, Series and Parallel networks

A

Serial, Distributed, Collapsed and Parallel networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of these statements is FALSE?

The network layer controls the conversations between different computers.

The network layer does accounting.

The network layer helps transmit data between hosts.

The network layer is responsible for determining the shortest path for a packet of data.

A

The network layer controls the conversations between different computers..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

All of the following are functions of the Data Link Layer except

provide a well defined interface to the Network Layer
regulate the flow of data
deal with transmission errors
stop all bad files from passing to the Physical Layer

A

stop all bad files from passing to the Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following is true about half-duplex mode?

Data is transmitted in both directions at the same time.

Data is transmitted in one direction only.

Data is not transmitted.

Data is transmitted in both directions but not at the same time.

A

Data is transmitted in both directions but not at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A data measurement unit that contains 8 bits of information is known as which of the following?

Byte

Kilobyte

Block

Petabyte

A

Byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is a unique downside that consumers face with a traditional cable network connection versus that of DSL?

The cost per month of service is higher.

None of these answers are correct.

Surrounding neighbors can affect the network bandwidth during peak hours.

Overall network stability and reliability are lower.

A

Surrounding neighbors can affect the network bandwidth during peak hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which type of network transmission mode transmits data in both directions simultaneously?

Full-Triplex

Metachronous

Asynchronous

Synchronous

A

Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which component involves processes that are completed in a task-oriented manner?

Machine learning

SD-WAN

Automation

AI

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which computer network, built by a business, is used to interconnect its various company sites in order to share computer resources?

EPN

PAN

WAN

MAN

A

EPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A computer network is a set of connected

cables
routers
computers
topologies

A

computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.

experiences

routers

permissions

networks

A

permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

When two systems first connect using SSH they exchange their _____ keys with each other.

public
decoder
private
car

A

public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What are some of the tunneling protocols that VPNs use?

IPsec and L2TP
AES and MD5
HTTP and FTP
Blowfish and Twofish

A

IPsec and L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

In a typical mail operation with POP, a message is pulled down from the remote server and:

The AOL voice says ‘You’ve got mail!’
A buzzer is activated in the mail client’s Bluetooth headset
The message is stored on the recipient’s device and is deleted from the remote server
A reply is automatically sent the to the sender

A

The message is stored on the recipient’s device and is deleted from the remote server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which device provides access control functionality between networks?

A Network Interface Card

A router

A printer

A switch

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What entity is responsible for allowing access to the WAN?

The consumer

None of the answers are correct

The ISP

The client

A

The ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which of these statements is NOT true about a NIC?

An Ethernet connection is the most common.
A NIC only allows for either a wired or wireless connection, not both.
Another term for it is LAN adapter.
It is often built into a computer’s motherboard.

A

A NIC only allows for either a wired or wireless connection, not both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What category of LAN card do laptops typically support?

A wireless card only.

Laptops don’t need LAN cards.

A wired card only.

Both wired and wireless cards.

A

Both wired and wireless cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

DNS servers use _____ servers to help resolve IP addresses to Domain Names

IP servers

Authoritative servers

Caching servers

Authentication servers

A

Authoritative servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of these is not one of TCP/IP’s five protocol layers?

Physical layer

Application/process layer

Network interface layer

Transmission

A

Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which of the following statements is true when a user first makes a DNS query by typing the domain name into the web browser?

A DNS query answer is returned from the authoritative servers

The local DNS cache is queried

A request is sent to an ISP recursive server

A request is sent to the respective root nameservers

A

The local DNS cache is queried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following statements is true?

MAC addresses can route data packets over the internet independent of IP addresses.

MAC and IP addresses can both work independently depending on the environment.

MAC and IP addresses need to work in parallel for effective communication.

NICs are hardwired with IP and MAC addresses.

A

MAC and IP addresses need to work in parallel for effective communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Why is it necessary for computer systems (hosts) to have a hostname or domain name?

  • It is necessary because it is an international standard which must be followed.
  • It is necessary because it differentiates it from other people’s computer systems.
  • It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
  • It is necessary because every device has a name and so this should not be different.
A

It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Of the multiple different addressing types mentioned, which is the odd one out that has no purpose in future IPv6 networking solutions?

Unicast

Multicast

Anycast

Broadcast

A

Broadcast

77
Q

Which of the following is/are true?

Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity.

Wireless Access points connect two different wired networks.

Wireless Access Points are often referred to as WI-MAX.

Wireless Access Points cannot be standalone.

A

Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity.

78
Q

Which of the following is a feature of 5G?

Multiple device support

Satellite uplink

Latency

Dead zones

A

Multiple device support

79
Q

An advantage of optical fiber over traditional copper wiring is:

You can pull it tighter
Less bulk
It can bend at greater angles than copper
Lower cost

A

Less bulk

80
Q

What is the main purpose of having a twisted pair cable?

To make installation easier

To cut down on costs

To reduce electromagnetic interference from outside sources

To double the transfer rate of data

A

To reduce electromagnetic interference from outside sources

81
Q

Which of the following media is comparatively cheaper, lighter and easier to install?

Twisted pair cable

Fiber optic cable

Wireless LAN

Coaxial cable

A

Twisted pair cable

82
Q

Security in a network ensures all of the following about the information that is passed around EXCEPT:

affordability

integrity

usability

safety

A

affordability

83
Q

The _____ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.

diagram
logical
physical
electrical

A

physical

84
Q

The presentation layer of the OSI model translates data into an acceptable format usable by which layer?

The data link layer
The session layer
The application layer
The network layer

A

The application layer

85
Q

What are two common WAN (Wide Area Network) design types?

Remote singular; Integrated topology
Main input; Redundant Input
MPLS; SD-WAN
Hub and spoke; Full mesh topology

A

Hub and spoke; Full mesh topology

86
Q

Which command is used for identifying the MAC address of a system?

ifconfig

getmac

ipconfig

ping

A

getmac

87
Q

The software or hardware used to connect two different networks is known as _____.

Giveaway

Internet device

Cloud

Gateway

A

Gateway

88
Q

What is the primary use for UDP?

Post Office Protocol Version 3

File Transfer Protocol

Telnet

Streaming

A

Streaming

89
Q

What range of addresses can be issued to a class C network?

172.10.0.0-191.255.255.255

10.0.0.0-126.0.0.0

192.0.0.0-223.255.255.255

0.0.0.0-255.255.255.255

A

192.0.0.0-223.255.255.255

90
Q

The 802.11n Protocol makes use of _____ technology:

Carrier Sense Multiple Access with Collision avoidance (CSMA/CA)

Dual-band wireless

Orthogonal Frequency-Division Multiplexing (OFDM)

Multiple Input/Multiple Output (MIMO)

A

Multiple Input/Multiple Output (MIMO)

91
Q

A computer can be a web server if it:

has a domain name

has large storage space for websites

offers services to other computers it is connected to

services web page requests by clients connecting to it

A

services web page requests by clients connecting to it

92
Q

Which of the following are valid configurations of a Wireless Access Point?

Firewall alone

IP address, NAT

MAC address, NAT, Firewall

IP address, NAT and Firewall

A

IP address, NAT and Firewall

93
Q

In the OSI model, all of the following are protocols of the application layer except:

IMAP
ICANN
POP3
HTTP

A

ICANN

94
Q

Which option contains the name of the layer responsible for translating, encrypting and compressing data within the OSI model?

Physical
Presentation
Session
Network
None of the answers is correct

A

Presentation

95
Q

Which of the following is not an application layer protocol?

SSH

TCP

Telnet

BOOTP

A

TCP

96
Q

In reference to internet domain names, a registrar is _____.

A company that sells web templates

A company that designs web pages

An institution that registers student enrollments

A company that sells domain names

A

A company that sells domain names

97
Q

Given the following information, identify the network address. IP: 192.155.1.2 Subnet mask: 255.255.0.0

255.255.

155.1.

192.155.

255.0.0

A

192.155.

98
Q

IP Addresses operate within the _____ layer of the TCP/IP protocol.

Data Link Layer

Application Layer

Network Layer

Physical Layer

A

Network Layer

99
Q

Live threat-intelligence helps the firewall to identify and stop _____.

  • Nothing. Threat-intelligence is not used to determine what the firewall may stop or allow.
  • Threats that the firewall may have never seen before.
  • Threats that are explicitly listed in the firewall’s access policy.
  • Threats the firewall administrator may be thinking of but for which the administrator has yet to add rules to the access policy.
A

Threats that the firewall may have never seen before.

100
Q

The OSI Model is used to:

describe how communications happen across a network
rate Internet Service Provides on their service
measure speed across the Internet
boost Internet bandwidth

A

describe how communications happen across a network

101
Q

What is the purpose of load balancing in a network?

It eliminates jitter.

It increases network processes allowing for a network to grow.

It distributes traffic to allow for a balance in the network keeping services available.

It assures network services by measuring the quality of the transmissions.

A

It distributes traffic to allow for a balance in the network keeping services available.

102
Q

What could Wi-Fi 7 provide support for?

Reduced QAM

Send data on multiple frequencies

Machine learning

Radio updates

A

Send data on multiple frequencies

103
Q

Which of the following is NOT a basic component of a telecommunication network?

Protocols
Remote control unit
Control software
Input and output devices
Telecommunication channels

A

Remote control unit

104
Q

The label in multi-protocol label switching contains _____.

the ingress and exit router information

the routers ingress and egress routing information

information on the predefined path for the packets to reach their destination

complete routing table information

A

information on the predefined path for the packets to reach their destination

105
Q

What unit of data measurement is used with synchronous transmissions?

Byte

Brick

Block

Nibble

A

Block

106
Q

If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?

A star design.
A full mesh design.
A bus design.
A hub and spoke design.

A

A full mesh design.

107
Q

An advantage of VLAN over LAN is _____.

that VLANs increases implementation costs over time but is more cost effective overall

VLANs require more network administration when compared to LANs increasing efficiency

nodes within the same VLAN need not be in the same physical location

that VLANs increased latency will reduce broadcast domains

A

nodes within the same VLAN need not be in the same physical location

108
Q

In which part of the OSI Model is the physical layer?

Bottom Layer

Middle Layer

Top layer

It does not belong to the OSI Model as a layer.

A

Bottom layer

109
Q

Which of the following is NOT a component of a network switch?

Switch Fabric

CPU

Replication Engine

Bypass Engine

A

Bypass Engine

110
Q

The secure logical connection to which IMAP is bound to connect to the internet is _____.

Part 143

Logic 993

Port 143

Port 993

A

Port 933

111
Q

Which of the following is the most accurate description of clients in client/server architecture?

  • All devices connected to a network
  • Desktop computers with a wired connection and laptop computers with a wireless connection
  • Hardware devices which provide end users with access to data and services on the server
  • Computers connected to a network used for downloading data from a server
A

Hardware devices which provide end users with access to data and services on the server

112
Q

Although security is important, why is there a need to use Wireless Access Point as a pass-through set-up which allows any server to get connected to the network?

To enable the peer devices to exchange data without much difficulty

A

To enable the peer devices to exchange data without much difficulty

113
Q

What type of bit is used with an asynchronous transmission to signal the beginning and end of a byte of data?

Control

Integer

ASCII

Double

A

Control

114
Q

What makes the symmetric DSL network type so different from the asymmetric type?

It has an equal balance between download and upload speeds.

None of these answers are correct.

It has higher upload speeds.

It has higher download speeds.

A

It has an equal balance between download and upload speeds.

115
Q

What Ethernet Standard Specification is suitable for a network requiring 100 Mbps speed and 2000 max cable distance?

10 GBase - LX4

100 Base - TX

100 Base - FX

10 GBase - SW

A

100 Base - FX

116
Q

Which network topology would be used to directly connect every computer in an office to every other computer in the office, using a one-to-one cabling method?

Tree
Ring
Star
Mesh
Bus

A

Mesh

117
Q

What are two types of VPNs?

IPSec and SSL
Remote and site
Site-to-site and remote access
Local area network and wide area network

A

Site-to-site and remote access

118
Q

SSH uses _____ cryptography to ensure authentication and security.

white-box
round-robin
twin-key
public-key

A

public-key

119
Q

A VLAN is created by multiple _____ that forwards all network traffic to other locations.

All of these answers are correct.

modems

switches

routers

A

switches

120
Q

The two main operational differences between the 802.11a protocol and the 802.11b protocol are:

802.11a protocol operates at 54Mbps within a 5GHz frequency range while 802.11b operates at 11Mbps within a 2.4GHz frequency range

802.11a protocol uses CSMA/CA at 1300Mbps while 802.11b protocol uses (OFDM) at 300Mbps

802.11b protocol operates at 54Mbps within a 5GHz frequency range while 802.11a operates at 11Mbps within a 2.4GHz frequency range

802.11a protocol uses CSMA/CA at 11Mbps while 802.11b protocol uses (OFDM) at 11Mbps

A

802.11a protocol operates at 54Mbps within a 5GHz frequency range while 802.11b operates at 11Mbps within a 2.4GHz frequency range

120
Q

Which internet protocol is responsible for re transmitting lost or erroneous data packets?

TPC

TCP

IP

OSI

A

TCP

121
Q

What are WLAN Protocols?

WLAN Protocols are 802.11 protocols which control the speed and frequency coverage over a Wide Area Network (WAN).

WLAN Protocols are 802.11n/g protocols which control the obstruction and interference over a Wide Area Network (WAN).

WLAN Protocols are network protocols which govern data transmissions over wide area connectivity.

WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.

A

WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.

122
Q

The frequency range of a channel is 4000hz to 6500hz. What is the bandwidth?

4000 hz

10,500 hz

6500 hz

2500 hz

A

2500 hz

123
Q

Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?

CAT2

Unshielded twisted pair

Fiber optic

Coaxial

A

Coaxial

124
Q

Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?

IP/NetBIOS

TCP/IP

OSI

NetBIOS

A

TCP/IP

125
Q

In the OSI model, the application layer is:

the fifth layer
the seventh layer
the first layer
the third layer

A

the seventh layer

126
Q

What does layer five of the OSI model do?

Moves packets from source to destination providing internetworking capabilities.
Establishes, manages and terminates communicative sessions.
Organizes bits into frames providing node-to-node delivery.
Provides access to available network resources.

A

Establishes, manages and terminates communicative sessions.

127
Q

_____ is a simplified setup procedure available on some wireless routers and access points.

AES
WPA
WPA2
WPS

A

WPS

128
Q

Which of the following is the purpose of a firewall access policy?

It determines the number of zones your firewall will have.
It gives your firewall threat-intelligence.
It provides a set of rules that determine who gets in or out of your network and who doesn’t.
It determines the operational state (on/off) of the firewall.

A

It provides a set of rules that determine who gets in or out of your network and who doesn’t.

129
Q

Which of the following devices can be used to interface computer networks that use different communication protocols?

Gateway

Router

Repeater

Hub

A

Gateway

130
Q

What is a network client?

A computer that receives data but does not send it
A computer that sends data but does not receive it
A computer that connects to a server in order to use and share resources with it
A computer that provides communications with other clients without an intermediary computer

A

A computer that connects to a server in order to use and share resources with it

131
Q

SMTP server A initiates communication with SMTP server B. SMTP server B responds with a _____

202 READY FOR MAIL

250 requested mail action

220 READY FOR MAIL

550 NO such users

A

220 READY FOR MAIL

132
Q

Which device provides access control functionality between networks?

A router

A printer

A Network Interface Card

A switch

A

A router

133
Q

Which network topology uses concentration routers to interconnect star network WANs?

Tiered topology

Mesh topology

Ring topology

Bus topology

A

Tiered topology

134
Q

Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.

single concurrent switches to the high level backbone routers

duplicate concurrent switches to the high level backbone routers

duplicate concurrent connections to the low level backbone routers

duplicate concurrent connections to the high level backbone routers

A

duplicate concurrent connections to the high level backbone routers

135
Q

What access method works best over mobile connections?

SSH.
VPN.
Telnet.
Mosh.

A

Mosh

136
Q

What criteria do EGPs use to determine data packet routes?

domain names, cost metrics, and optimal paths

locations, cost metrics, and bandwidth

locations, cost metrics, and optimal paths

locations, external addresses, and optimal paths

A

locations, cost metrics, and optimal paths

137
Q

All of the following are characteristics of UDP EXCEPT:

Multicast

Datagrams

Reliable

Connectionless

A

Reliable

138
Q

Which layer is the network layer in the OSI 7 layer model?

2

3

5

1

A

3

139
Q

Which is the oldest, least secure method of wireless security?

WPA2
WEP
WPA
TKIP

A

WEP

140
Q

Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports?

Gateway

Router

Hub

Switch

A

Switch

141
Q

What is a server?

A satellite computer that requests data from a central computer in a network

A computer that hosts data and other resources for clients

A computer that does all of the work for another computer, serving its every need

A network where data is hosted and pulled by clients

A

A network where data is hosted and pulled by clients

142
Q

The _____ mail command starts the process of sending sequential lines of texts with the message

354

220

250

550

A

354

143
Q

A client plans to have a network to connect many computers in one room and at the same time allow access to the Internet from these computers. What are the devices that the client is going to need?

A switch and a router.

A switch only.

A gateway only.

A router only.

A

A switch and a router.

144
Q

What is the result of entering nslookup command in the command prompt?

MAC address of the system

MAC address of the host server

IP address of the system

IP address of the host server

A

IP address of the host server

145
Q

Which two components enable a switch fabric to operate?

ROM and RAM

CPU and Controller

Controller and Buffers

Forwarding and Replication Engines

A

Controller and Buffers

146
Q

Which of the following is NOT a component of a router?

NVRAM

Ports

Graphics card

RAM

A

Graphics card

147
Q

Which of the following types of routing do NOT carry a subnet mask?

None of these

Classful routing

Classless routing

Routing tables

A

Classful routing

148
Q

The label in multi-protocol label switching contains _____.

  • the routers ingress and egress routing information
  • information on the predefined path for the packets to reach their destination
  • the ingress and exit router information
  • complete routing table information
A

information on the predefined path for the packets to reach their destination

149
Q

One of the main disadvantages of the collapsed backbone is the _____.

  • susceptibility of complete system failure if the sub network fails
  • susceptibility to complete system failure if the backbone router fails
  • failure of duplicate connections
  • system easily collapses under data transmission congestion
A

susceptibility to complete system failure if the backbone router fails

150
Q

The _____ of a network describes how the connections appear to the end user or how signals are passed across the network.

protocol suite
logical topology
signal pattern
physical topology

A

logical topology

151
Q

Which of the following is the most accurate description of clients in client/server architecture?

  • Computers connected to a network used for downloading data from a server
  • All devices connected to a network
  • Desktop computers with a wired connection and laptop computers with a wireless connection
  • Hardware devices which provide end users with access to data and services on the server
A

Hardware devices which provide end users with access to data and services on the server

152
Q

A URL consists of different levels. What level is .com in the web address www.google.com?

Host name

Domain name

Very high level domain

Web address

Top-level domain name

A

Top-level domain name

153
Q

Which of the following best describes the connection tool for a new smartphone that can connect to Wi-Fi?

Wireless card

Integrated Wi-Fi

Access Point

Hotspot

A

Integrated Wi-Fi

154
Q

The wireless access points have a _____ that help share connections

bridge

switch

cable

hub

A

switch

155
Q

The transport layer performs data packet creation and what other types of services?

Error checking

Information display

Media connection

Descending layer

A

Error checking

156
Q

An NIC is used for which of the following?

Connecting a computer to a network.

Securing a computer in a network.

Connecting a telephone to the network.

Using as a telephone wire.

A

Connecting a computer to a network.

157
Q

Which layer is the network layer in the OSI 7 layer model?

2

5

1

3

A

3

158
Q

What is a WAN topology?

  • WAN topology describes the arrangement concentration routers monitoring the LANs
  • WAN topology describes the arrangement by which components within the WAN are organized
  • WAN topology describes the arrangement by which the mesh components within the WAN are distributed
  • WAN topology describes a system by which the components within the WAN are named
A

WAN topology describes the arrangement by which components within the WAN are organized

159
Q

Many family members using the network connection at the same time reduces:

Throughput

Delays

Bandwidth

Theoretical speed

A

Throughput

160
Q

Which of the following statements about a VLAN environment is TRUE?

  • Access link connections can handle multiple VLAN connections
  • Computers or nodes by default are not VLAN aware
  • A LAN is a logical setup of a VLAN within a network system
  • Trunking is the ability for a port to curtail the number of broadcast packets
A

Computers or nodes by default are not VLAN aware

161
Q

How does the use of a router differ from a bridge in telecommunication?

  • Routers contain many ports to connect different network segments, while a bridge ensures that requests from within the network for information over the internet are distributed to the correct computer within the network.
  • A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
  • A router receives electronic signals, cleans and retransmits them at a higher power level, while a bridge receives electronic signals, cleans and retransmits them at a lower power level.
  • A router contains many ports to connect different network segments, while a bridge sends data it receives only to specific ports.
A

A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.

162
Q

A specially built server:

  • is a desktop computer with advanced applications
  • is built with redundant power supplies to maintain constant availability
  • can only serve a limited number of connections on its network
  • is more robust with fewer clients connected to it
A

is built with redundant power supplies to maintain constant availability

163
Q

Why is the role of RTCP important in VoIP communications?

It connects the VoIP service to the local area network.

It allows the sender to select what type of message to send.

It allows adjustments to be made to fine-tune transmissions.

It allows video packets to be sent between multiple devices.

A

It allows adjustments to be made to fine-tune transmissions.

164
Q

What is the primary use for UDP?

Post Office Protocol Version 3

File Transfer Protocol

Telnet

Streaming

A

Streaming

165
Q

What is the purpose of FTP?

To open a web site.

To transfer a file in a network.

To establish remote connection.

To start a chat process.

A

To transfer a file in a network.

166
Q

MIME not only helped move the email standard forward but helped to make __________ a more enjoyable experience as well.

web browsing

downloading files

texting

logging online

A

web browsing

167
Q

One characteristic of MPLS switching is that it _____.

has little control on network traffic

is very inefficient

prevent multiple network hops

prevents network congestion

A

prevents network congestion

168
Q

Computers on a network are called:

servers
clients
nodes
switches

A

nodes

169
Q

Which acronym refers to the network name that your router broadcasts so you can find it?

WEP
SSID
TKIP
WPA

A

SSID

170
Q

What are WLAN Protocols?

  • WLAN Protocols are network protocols which govern data transmissions over wide area connectivity.
  • WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
  • WLAN Protocols are 802.11 protocols which control the speed and frequency coverage over a Wide Area Network (WAN).
  • WLAN Protocols are 802.11n/g protocols which control the obstruction and interference over a Wide Area Network (WAN).
A

WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.

171
Q

The network layer converts:

Logical addresses into physical addresses

Physical addresses into logical addresses

MAC addresses into layers

Layers into MAC addresses

A

Logical addresses into physical addresses

172
Q

What kind of channel does broadband transmission use?

Medium pass channel

Bandpass channel

High pass channel

Low pass channel

A

Bandpass channel

173
Q

The Internet is defined as _____.

the network of things

the access by individuals to orbital Clouds

the network of networks consisting of millions of devices communicating globally

the internal network connecting two nodes

A

the network of networks consisting of millions of devices communicating globally

174
Q

Which of the following is not an application layer protocol?

BOOTP

Telnet

SSH

TCP

A

TCP

175
Q

Which device provides access control functionality between networks?

A router

A Network Interface Card

A switch

A printer

A

A router

176
Q

Which of the following terms refers to defining the rules for communication between two computers to prevent overload?

A

flow control

177
Q

A hardware device that has a built-in network adapter, antenna and radio for Wi-Fi is a(n) _____.

A

access point

178
Q

What are the benefits of a DSL network over the previous method known as dial-up?

A

All answers

179
Q

The internet is an example of a _____ _____ Network.

A

wide area

180
Q

Crosstalk and attenuation are NOT a problem in which of the following media?

A

fiber optic cable

181
Q

One of the other protocols that works along with POP is SMTP, which stands for:

A

simple mail transfer ptotocol

182
Q

In order to check the nodes that are connected to a system, one can use the command

A

netstat

183
Q

Ethernet is an example of which kind of signal topology?

A

sharedv media access

184
Q

Which option below best completes this sentence: Among other communicative tasks, the session layer also terminates:

A

sessions between software process

185
Q

DNS is an acronym for:

A

domain name system

186
Q

Which of the following devices can be used to interface computer networks that use different communication protocols?

A

gateway

187
Q

Select the correct definition for a gateway.

A

the router through which a device can access on external networks

188
Q

What is Address Translation(AT)?

A

AT is mappinh private IP addresses to public IP addresses