Final Exam - 1 Flashcards
In a cable network environment, what is the name of the cable type that connects from the wall outlet to the modem?
USB
Lightning
None of these answers are correct.
Coaxial
Coaxial
What are the benefits of a DSL network over the previous method known as dial-up?
- Having much higher network speeds overall.
- All of these answers are correct.
- Much more stability in terms of network reliability.
- Being able to talk on the phone and surf the web at the same time.
Being able to talk on the phone and surf the web at the same time.
In WANs, which of the following is NOT a characteristic of mesh topology?
- Data transmissions are carried out via multiple routes
- All sites are connected to each other
- Implementation incurs high costs
- Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
Watching a YouTube video on the web is an example of which video-over-IP service?
Video conferencing
IPTV
TCP/IP
Streaming video
Streaming video
What type of video-over-IP service relies on two-way communication?
TV broadcast
IPTV
Video conferencing
Streaming video
Video conferencing
RTCP as a transport protocol doesn’t deliver any data. Instead, it focuses on _____.
Logistical transfer
Password acceptance
Wi-Fi controls
Quality control
Quality control
Which of the following is NOT a standard Wi-Fi communications standard?
802.11x
802.11n
802.11ac
802.11g
802.11x
How do signals travel between a GPS satellite and an on-the-ground GPS receiver?
- From the satellite to the receiver and back, but through a ground station
- Only from the satellite to the receiver
- From the satellite to a ground station and then from the ground station to the receiver
- From the satellite to the receiver and back
Only from the satellite to the receiver
Which two protocols are NOT backward compatible?
802.11a and 802.11ac
802.11a and 802.11b
802.11g and 802.11b
802.11g and 802.11ac
802.11a and 802.11b
How many servers does a typical client/server network have?
6
One for every three clients
At least one
As many as there are clients
At least one
Which of the following is a benefit of using three-tier network architecture relative to two-tier?
Increased security
All answers are correct
Increased performance
Greater flexibility
All answers are correct
In what way is a peer-to-peer network different from client/server networks?
- In peer-to-peer, tasks are allocated to only one member of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
- In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, only one client requests resources or services from the network.
- In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
- In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a very powerful computer does all of the processing.
- In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, a number of network clients or workstations request resources or services from the network.
In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
What is a backbone network?
a low capacity connectivity infrastructure that forms the backup link to the different sub networks connected to it
a high capacity connectivity infrastructure that forms the main link to the different sub networks connected to it
the parallel backup network incorporated into enterprise designs
the infrastructure designed as a backup to the main network infrastructure
a high capacity connectivity infrastructure that forms the main link to the different sub networks connected to it
Padding data is required within an Ethernet frame to _____.
hold the Pad Mac Address
synchronize frame transmission
fulfill minimum field length requirement
initiate a transmission queue
fulfill minimum field length requirement
A wireless network for Internet access in a large building is typically connected in a _____ topology.
ring
mesh
logical
physical
mesh
CAT 3 and CAT 5 belong to which of the following cable categories?
Coaxial cable
Fiber optic cable
Unshielded twisted pair cable
Shielded twisted pair cable
Shielded twisted pair cable
Which of these statements is true?
- You can expect to get just as much throughput as you ask for
- You should rarely expect delays when you ask for data
- You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
- Data always travels the same speed on the network
You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
In reference to computers and the internet, what is bandwidth?
Bandwidth is how wide your data can get
Bandwidth is the actual speed of your data
Bandwidth is the theoretical speed of your data
Bandwidth is the speed of your data
Bandwidth is the theoretical speed of your data
IMAP is the vehicle by which _____.
- compatibility updates are synchronized between Outlook and other email servers.
- messages are moved, organized and manipulated between the mail server and the mail client application.
- client applications are moved, organized and manipulated between the mail server and the mail client application
- synchronization is achieved between email clients and ISPs.
messages are moved, organized and manipulated between the mail server and the mail client application.
In the SMTP server to server set up, the email clients serve to _____
- authorize SMTP commands
- generate protocol commands to the internet
- Receive/Send and queue messages between SMTP servers and clients
- authorize SMTP servers
Receive/Send and queue messages between SMTP servers and clients
IMAP can allow a user with multiple devices to _____.
access their emails simultaneously from any of the devices.
consolidate system updates on all devices.
access the protocol simultaneously from any of the devices.
synchronize playback of multimedia from all devices.
access their emails simultaneously from any of the devices.
What will happen if you enter the IP address 142.250.191.206 into your web browser?
Nothing, it is not possible to enter numbers
Google.com
Your anti-virus will flash a warning
An error will occur
Google.com
Which of the following statements is true?
Recursive name servers respond to queries from TLD name servers
Local DNS cache respond to queries from root servers
Recursive name servers respond to queries from authoritative servers
Authoritative name servers respond to queries from recursive name servers
Authoritative name servers respond to queries from recursive name servers
The organization that currently regulates and manages the Internet is _____.
IANA
ICANN
WTO
IETF
ICANN
At the ‘receiving’ computer, the transport layer provides input to which OSI layer?
The physical layer
The network layer
The session layer
The data link layer
The session layer
The presentation layer of the OSI model is responsible for integrating all data formats into what type of form?
Generalized and complete
Acceptable and compatible
Slow and accurate
Summarized and accurate
Acceptable and compatible
The unique identifier applicable to a specific network computer or node is the Network _____.
processor
address
protocol
tag
address
Internet of Things (IoT) differs from the Internet in that _____.
it is the medium through which devices communicate while the Internet is the framework
IoT uses hardware while the Internet uses software
it is proprietary devices only which connect to the internet while the internet is the gateway
It is the ability for every electronic device to connect via the internet while the Internet is the medium by which they connect
It is the ability for every electronic device to connect via the internet while the Internet is the medium by which they connect
A VLAN is defined as _____.
a very large Local Area Network
a volatile LAN
a logical implementation of a Wide area network
a logical implementation of a LAN
a logical implementation of a LAN
A specially designed server operating system can serve:
multiple power sources on its network
multiple hard drives on its system
multiple software to its systems
numerous concurrent clients connections
numerous concurrent clients connections
One example of network security is the usage of passwords to protect individual accounts and information. What common sense password rule is often ignored in this case?
- Making a password too short.
- Making the password completely unique, not simply recycling the same password with a simple change.
- Writing the password down and leaving it in the open.
- Making a password hard to guess and not using easy things such as a pet name or a family member’s birthday.
Writing the password down and leaving it in the open.
Which of the following is an unintentional threat to the security of computer networks?
Denial of Service (DoS) attacks
Computer viruses
Computer failures
Sabotage
Theft of Data
Computer failures
Which word below best describes a flaw in network security which permits an assault on network resources.
Instability
Incompatibility
Unreliability
Vulnerability
Vulnerability
_____ represents a standard IP address.
10101000.01001010.0001001.11111111
10101000.01001010.00000101.11100111
1010000.01001010.00011001.11111111
10101000.01001010.00011001.1111111
10101000.01001010.00000101.11100111
In terms of computer networking, what is a router?
- A computer networking device that allows for computers and other devices to be connected together in a general area.
- A tool used to prevent computer viruses from accessing a computer.
- A device that is used to assist electricians in routing wires and other cables through a wall.
- A device that allows for several individual networks to be connected to each other.
A device that allows for several individual networks to be connected to each other.
How could a non-routable device send or receive messages on the Internet?
Restrict IP range to 10.0.0.0 -> 10.255.255.255
Use Class D IP address values
Use network address translation
Non-routable devices are not allowed any Internet access
Use network address translation
What makes Mosh an alternative to SSH?
Mosh is more secure than SSH.
Mosh can reconnect if a wireless connection gets interrupted.
Mosh is faster than SSH.
Mosh is easier to set up than SSH.
Mosh can reconnect if a wireless connection gets interrupted
What main use does Telnet have in modern IT?
Telnet is often used for embedded devices.
Telnet offers remote access to Intranet resources.
Telnet is used for secure access to remote computers.
Telnet is used for fun things like games.
Telnet is often used for embedded devices.
SSH client and server utilities are found on most operating systems by default, except _____.
Unix
Linux
Microsoft Windows
MAC OS X
Microsoft Windows
Of the options listed, which is the most used WAN (Wide Area Network) carrier?
Dark Fiber
Dedicated Lines
Frame Relay
MPLS
MPLS
In order for voice packets to be routed correctly through the Internet, they have to have detailed what?
Labels
Zipcodes
Dogtags
Instruction sheets
Labels
Which of the following technologies use microwaves?
None of these use microwaves
Infrared
FM Radio
Cellular
Cellular
What is the benefit of the client-server model?
Redundant resources
It is faster than direct connection of clients
Ease of management
There are many servers to choose from
Ease of management
In a _____ topology network, all the devices are connected back to a central hub or switch.
bus
star
mesh
logical
star
In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?
CAT7
CAT4
CAT5e
CAT5
CAT5e
POP is within what layer of the OSI Model?
layer 1
layer 3
layer 7
layer 2
layer 7
An IPv4 address contains _____ digits in _____ sets separated by a _____.
4; 3; comma
3, 4 ; comma
3; 4; period
4; 3; period
3; 4; period
In the OSI physical layer, data is transmitted in the form of _____.
both optical and electromagnetic signals
electromagnetic signals
infrared rays
optical signals
both optical and electromagnetic signals
What is Ethernet?
A type of network card
An early version of the Internet
A standard for computer networking technologies
A type of computer cable
A standard for computer networking technologies
A good administrator _____ the needs of security in the organization and the capabilities of the employees in the organization.
talks about
balances
considers
ignores
balances
Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.
duplicate concurrent connections to the low level backbone routers
duplicate concurrent connections to the high level backbone routers
duplicate concurrent switches to the high level backbone routers
single concurrent switches to the high level backbone routers
duplicate concurrent connections to the high level backbone routers
Four types of backbone networks are _____.
Serial, Distributed, Collapsed and Parallel networks
Serial, Collapsed, Distributed and Paramount networks
Series, Collapsed, Distributed and Parallel networks
Distributed, Collage, Series and Parallel networks
Serial, Distributed, Collapsed and Parallel networks
Which of these statements is FALSE?
The network layer controls the conversations between different computers.
The network layer does accounting.
The network layer helps transmit data between hosts.
The network layer is responsible for determining the shortest path for a packet of data.
The network layer controls the conversations between different computers..
All of the following are functions of the Data Link Layer except
provide a well defined interface to the Network Layer
regulate the flow of data
deal with transmission errors
stop all bad files from passing to the Physical Layer
stop all bad files from passing to the Physical Layer
Which of the following is true about half-duplex mode?
Data is transmitted in both directions at the same time.
Data is transmitted in one direction only.
Data is not transmitted.
Data is transmitted in both directions but not at the same time.
Data is transmitted in both directions but not at the same time.
A data measurement unit that contains 8 bits of information is known as which of the following?
Byte
Kilobyte
Block
Petabyte
Byte
What is a unique downside that consumers face with a traditional cable network connection versus that of DSL?
The cost per month of service is higher.
None of these answers are correct.
Surrounding neighbors can affect the network bandwidth during peak hours.
Overall network stability and reliability are lower.
Surrounding neighbors can affect the network bandwidth during peak hours.
Which type of network transmission mode transmits data in both directions simultaneously?
Full-Triplex
Metachronous
Asynchronous
Synchronous
Synchronous
Which component involves processes that are completed in a task-oriented manner?
Machine learning
SD-WAN
Automation
AI
Automation
Which computer network, built by a business, is used to interconnect its various company sites in order to share computer resources?
EPN
PAN
WAN
MAN
EPN
A computer network is a set of connected
cables
routers
computers
topologies
computers
In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.
experiences
routers
permissions
networks
permissions
When two systems first connect using SSH they exchange their _____ keys with each other.
public
decoder
private
car
public
What are some of the tunneling protocols that VPNs use?
IPsec and L2TP
AES and MD5
HTTP and FTP
Blowfish and Twofish
IPsec and L2TP
In a typical mail operation with POP, a message is pulled down from the remote server and:
The AOL voice says ‘You’ve got mail!’
A buzzer is activated in the mail client’s Bluetooth headset
The message is stored on the recipient’s device and is deleted from the remote server
A reply is automatically sent the to the sender
The message is stored on the recipient’s device and is deleted from the remote server
Which device provides access control functionality between networks?
A Network Interface Card
A router
A printer
A switch
A router
What entity is responsible for allowing access to the WAN?
The consumer
None of the answers are correct
The ISP
The client
The ISP
Which of these statements is NOT true about a NIC?
An Ethernet connection is the most common.
A NIC only allows for either a wired or wireless connection, not both.
Another term for it is LAN adapter.
It is often built into a computer’s motherboard.
A NIC only allows for either a wired or wireless connection, not both.
What category of LAN card do laptops typically support?
A wireless card only.
Laptops don’t need LAN cards.
A wired card only.
Both wired and wireless cards.
Both wired and wireless cards.
DNS servers use _____ servers to help resolve IP addresses to Domain Names
IP servers
Authoritative servers
Caching servers
Authentication servers
Authoritative servers
Which of these is not one of TCP/IP’s five protocol layers?
Physical layer
Application/process layer
Network interface layer
Transmission
Transmission
Which of the following statements is true when a user first makes a DNS query by typing the domain name into the web browser?
A DNS query answer is returned from the authoritative servers
The local DNS cache is queried
A request is sent to an ISP recursive server
A request is sent to the respective root nameservers
The local DNS cache is queried
Which of the following statements is true?
MAC addresses can route data packets over the internet independent of IP addresses.
MAC and IP addresses can both work independently depending on the environment.
MAC and IP addresses need to work in parallel for effective communication.
NICs are hardwired with IP and MAC addresses.
MAC and IP addresses need to work in parallel for effective communication.
Why is it necessary for computer systems (hosts) to have a hostname or domain name?
- It is necessary because it is an international standard which must be followed.
- It is necessary because it differentiates it from other people’s computer systems.
- It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
- It is necessary because every device has a name and so this should not be different.
It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
Of the multiple different addressing types mentioned, which is the odd one out that has no purpose in future IPv6 networking solutions?
Unicast
Multicast
Anycast
Broadcast
Broadcast
Which of the following is/are true?
Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity.
Wireless Access points connect two different wired networks.
Wireless Access Points are often referred to as WI-MAX.
Wireless Access Points cannot be standalone.
Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity.
Which of the following is a feature of 5G?
Multiple device support
Satellite uplink
Latency
Dead zones
Multiple device support
An advantage of optical fiber over traditional copper wiring is:
You can pull it tighter
Less bulk
It can bend at greater angles than copper
Lower cost
Less bulk
What is the main purpose of having a twisted pair cable?
To make installation easier
To cut down on costs
To reduce electromagnetic interference from outside sources
To double the transfer rate of data
To reduce electromagnetic interference from outside sources
Which of the following media is comparatively cheaper, lighter and easier to install?
Twisted pair cable
Fiber optic cable
Wireless LAN
Coaxial cable
Twisted pair cable
Security in a network ensures all of the following about the information that is passed around EXCEPT:
affordability
integrity
usability
safety
affordability
The _____ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.
diagram
logical
physical
electrical
physical
The presentation layer of the OSI model translates data into an acceptable format usable by which layer?
The data link layer
The session layer
The application layer
The network layer
The application layer
What are two common WAN (Wide Area Network) design types?
Remote singular; Integrated topology
Main input; Redundant Input
MPLS; SD-WAN
Hub and spoke; Full mesh topology
Hub and spoke; Full mesh topology
Which command is used for identifying the MAC address of a system?
ifconfig
getmac
ipconfig
ping
getmac
The software or hardware used to connect two different networks is known as _____.
Giveaway
Internet device
Cloud
Gateway
Gateway
What is the primary use for UDP?
Post Office Protocol Version 3
File Transfer Protocol
Telnet
Streaming
Streaming
What range of addresses can be issued to a class C network?
172.10.0.0-191.255.255.255
10.0.0.0-126.0.0.0
192.0.0.0-223.255.255.255
0.0.0.0-255.255.255.255
192.0.0.0-223.255.255.255
The 802.11n Protocol makes use of _____ technology:
Carrier Sense Multiple Access with Collision avoidance (CSMA/CA)
Dual-band wireless
Orthogonal Frequency-Division Multiplexing (OFDM)
Multiple Input/Multiple Output (MIMO)
Multiple Input/Multiple Output (MIMO)
A computer can be a web server if it:
has a domain name
has large storage space for websites
offers services to other computers it is connected to
services web page requests by clients connecting to it
services web page requests by clients connecting to it
Which of the following are valid configurations of a Wireless Access Point?
Firewall alone
IP address, NAT
MAC address, NAT, Firewall
IP address, NAT and Firewall
IP address, NAT and Firewall
In the OSI model, all of the following are protocols of the application layer except:
IMAP
ICANN
POP3
HTTP
ICANN
Which option contains the name of the layer responsible for translating, encrypting and compressing data within the OSI model?
Physical
Presentation
Session
Network
None of the answers is correct
Presentation
Which of the following is not an application layer protocol?
SSH
TCP
Telnet
BOOTP
TCP
In reference to internet domain names, a registrar is _____.
A company that sells web templates
A company that designs web pages
An institution that registers student enrollments
A company that sells domain names
A company that sells domain names
Given the following information, identify the network address. IP: 192.155.1.2 Subnet mask: 255.255.0.0
255.255.
155.1.
192.155.
255.0.0
192.155.
IP Addresses operate within the _____ layer of the TCP/IP protocol.
Data Link Layer
Application Layer
Network Layer
Physical Layer
Network Layer
Live threat-intelligence helps the firewall to identify and stop _____.
- Nothing. Threat-intelligence is not used to determine what the firewall may stop or allow.
- Threats that the firewall may have never seen before.
- Threats that are explicitly listed in the firewall’s access policy.
- Threats the firewall administrator may be thinking of but for which the administrator has yet to add rules to the access policy.
Threats that the firewall may have never seen before.
The OSI Model is used to:
describe how communications happen across a network
rate Internet Service Provides on their service
measure speed across the Internet
boost Internet bandwidth
describe how communications happen across a network
What is the purpose of load balancing in a network?
It eliminates jitter.
It increases network processes allowing for a network to grow.
It distributes traffic to allow for a balance in the network keeping services available.
It assures network services by measuring the quality of the transmissions.
It distributes traffic to allow for a balance in the network keeping services available.
What could Wi-Fi 7 provide support for?
Reduced QAM
Send data on multiple frequencies
Machine learning
Radio updates
Send data on multiple frequencies
Which of the following is NOT a basic component of a telecommunication network?
Protocols
Remote control unit
Control software
Input and output devices
Telecommunication channels
Remote control unit
The label in multi-protocol label switching contains _____.
the ingress and exit router information
the routers ingress and egress routing information
information on the predefined path for the packets to reach their destination
complete routing table information
information on the predefined path for the packets to reach their destination
What unit of data measurement is used with synchronous transmissions?
Byte
Brick
Block
Nibble
Block
If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?
A star design.
A full mesh design.
A bus design.
A hub and spoke design.
A full mesh design.
An advantage of VLAN over LAN is _____.
that VLANs increases implementation costs over time but is more cost effective overall
VLANs require more network administration when compared to LANs increasing efficiency
nodes within the same VLAN need not be in the same physical location
that VLANs increased latency will reduce broadcast domains
nodes within the same VLAN need not be in the same physical location
In which part of the OSI Model is the physical layer?
Bottom Layer
Middle Layer
Top layer
It does not belong to the OSI Model as a layer.
Bottom layer
Which of the following is NOT a component of a network switch?
Switch Fabric
CPU
Replication Engine
Bypass Engine
Bypass Engine
The secure logical connection to which IMAP is bound to connect to the internet is _____.
Part 143
Logic 993
Port 143
Port 993
Port 933
Which of the following is the most accurate description of clients in client/server architecture?
- All devices connected to a network
- Desktop computers with a wired connection and laptop computers with a wireless connection
- Hardware devices which provide end users with access to data and services on the server
- Computers connected to a network used for downloading data from a server
Hardware devices which provide end users with access to data and services on the server
Although security is important, why is there a need to use Wireless Access Point as a pass-through set-up which allows any server to get connected to the network?
To enable the peer devices to exchange data without much difficulty
To enable the peer devices to exchange data without much difficulty
What type of bit is used with an asynchronous transmission to signal the beginning and end of a byte of data?
Control
Integer
ASCII
Double
Control
What makes the symmetric DSL network type so different from the asymmetric type?
It has an equal balance between download and upload speeds.
None of these answers are correct.
It has higher upload speeds.
It has higher download speeds.
It has an equal balance between download and upload speeds.
What Ethernet Standard Specification is suitable for a network requiring 100 Mbps speed and 2000 max cable distance?
10 GBase - LX4
100 Base - TX
100 Base - FX
10 GBase - SW
100 Base - FX
Which network topology would be used to directly connect every computer in an office to every other computer in the office, using a one-to-one cabling method?
Tree
Ring
Star
Mesh
Bus
Mesh
What are two types of VPNs?
IPSec and SSL
Remote and site
Site-to-site and remote access
Local area network and wide area network
Site-to-site and remote access
SSH uses _____ cryptography to ensure authentication and security.
white-box
round-robin
twin-key
public-key
public-key
A VLAN is created by multiple _____ that forwards all network traffic to other locations.
All of these answers are correct.
modems
switches
routers
switches
The two main operational differences between the 802.11a protocol and the 802.11b protocol are:
802.11a protocol operates at 54Mbps within a 5GHz frequency range while 802.11b operates at 11Mbps within a 2.4GHz frequency range
802.11a protocol uses CSMA/CA at 1300Mbps while 802.11b protocol uses (OFDM) at 300Mbps
802.11b protocol operates at 54Mbps within a 5GHz frequency range while 802.11a operates at 11Mbps within a 2.4GHz frequency range
802.11a protocol uses CSMA/CA at 11Mbps while 802.11b protocol uses (OFDM) at 11Mbps
802.11a protocol operates at 54Mbps within a 5GHz frequency range while 802.11b operates at 11Mbps within a 2.4GHz frequency range
Which internet protocol is responsible for re transmitting lost or erroneous data packets?
TPC
TCP
IP
OSI
TCP
What are WLAN Protocols?
WLAN Protocols are 802.11 protocols which control the speed and frequency coverage over a Wide Area Network (WAN).
WLAN Protocols are 802.11n/g protocols which control the obstruction and interference over a Wide Area Network (WAN).
WLAN Protocols are network protocols which govern data transmissions over wide area connectivity.
WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
The frequency range of a channel is 4000hz to 6500hz. What is the bandwidth?
4000 hz
10,500 hz
6500 hz
2500 hz
2500 hz
Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?
CAT2
Unshielded twisted pair
Fiber optic
Coaxial
Coaxial
Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?
IP/NetBIOS
TCP/IP
OSI
NetBIOS
TCP/IP
In the OSI model, the application layer is:
the fifth layer
the seventh layer
the first layer
the third layer
the seventh layer
What does layer five of the OSI model do?
Moves packets from source to destination providing internetworking capabilities.
Establishes, manages and terminates communicative sessions.
Organizes bits into frames providing node-to-node delivery.
Provides access to available network resources.
Establishes, manages and terminates communicative sessions.
_____ is a simplified setup procedure available on some wireless routers and access points.
AES
WPA
WPA2
WPS
WPS
Which of the following is the purpose of a firewall access policy?
It determines the number of zones your firewall will have.
It gives your firewall threat-intelligence.
It provides a set of rules that determine who gets in or out of your network and who doesn’t.
It determines the operational state (on/off) of the firewall.
It provides a set of rules that determine who gets in or out of your network and who doesn’t.
Which of the following devices can be used to interface computer networks that use different communication protocols?
Gateway
Router
Repeater
Hub
Gateway
What is a network client?
A computer that receives data but does not send it
A computer that sends data but does not receive it
A computer that connects to a server in order to use and share resources with it
A computer that provides communications with other clients without an intermediary computer
A computer that connects to a server in order to use and share resources with it
SMTP server A initiates communication with SMTP server B. SMTP server B responds with a _____
202 READY FOR MAIL
250 requested mail action
220 READY FOR MAIL
550 NO such users
220 READY FOR MAIL
Which device provides access control functionality between networks?
A router
A printer
A Network Interface Card
A switch
A router
Which network topology uses concentration routers to interconnect star network WANs?
Tiered topology
Mesh topology
Ring topology
Bus topology
Tiered topology
Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.
single concurrent switches to the high level backbone routers
duplicate concurrent switches to the high level backbone routers
duplicate concurrent connections to the low level backbone routers
duplicate concurrent connections to the high level backbone routers
duplicate concurrent connections to the high level backbone routers
What access method works best over mobile connections?
SSH.
VPN.
Telnet.
Mosh.
Mosh
What criteria do EGPs use to determine data packet routes?
domain names, cost metrics, and optimal paths
locations, cost metrics, and bandwidth
locations, cost metrics, and optimal paths
locations, external addresses, and optimal paths
locations, cost metrics, and optimal paths
All of the following are characteristics of UDP EXCEPT:
Multicast
Datagrams
Reliable
Connectionless
Reliable
Which layer is the network layer in the OSI 7 layer model?
2
3
5
1
3
Which is the oldest, least secure method of wireless security?
WPA2
WEP
WPA
TKIP
WEP
Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports?
Gateway
Router
Hub
Switch
Switch
What is a server?
A satellite computer that requests data from a central computer in a network
A computer that hosts data and other resources for clients
A computer that does all of the work for another computer, serving its every need
A network where data is hosted and pulled by clients
A network where data is hosted and pulled by clients
The _____ mail command starts the process of sending sequential lines of texts with the message
354
220
250
550
354
A client plans to have a network to connect many computers in one room and at the same time allow access to the Internet from these computers. What are the devices that the client is going to need?
A switch and a router.
A switch only.
A gateway only.
A router only.
A switch and a router.
What is the result of entering nslookup command in the command prompt?
MAC address of the system
MAC address of the host server
IP address of the system
IP address of the host server
IP address of the host server
Which two components enable a switch fabric to operate?
ROM and RAM
CPU and Controller
Controller and Buffers
Forwarding and Replication Engines
Controller and Buffers
Which of the following is NOT a component of a router?
NVRAM
Ports
Graphics card
RAM
Graphics card
Which of the following types of routing do NOT carry a subnet mask?
None of these
Classful routing
Classless routing
Routing tables
Classful routing
The label in multi-protocol label switching contains _____.
- the routers ingress and egress routing information
- information on the predefined path for the packets to reach their destination
- the ingress and exit router information
- complete routing table information
information on the predefined path for the packets to reach their destination
One of the main disadvantages of the collapsed backbone is the _____.
- susceptibility of complete system failure if the sub network fails
- susceptibility to complete system failure if the backbone router fails
- failure of duplicate connections
- system easily collapses under data transmission congestion
susceptibility to complete system failure if the backbone router fails
The _____ of a network describes how the connections appear to the end user or how signals are passed across the network.
protocol suite
logical topology
signal pattern
physical topology
logical topology
Which of the following is the most accurate description of clients in client/server architecture?
- Computers connected to a network used for downloading data from a server
- All devices connected to a network
- Desktop computers with a wired connection and laptop computers with a wireless connection
- Hardware devices which provide end users with access to data and services on the server
Hardware devices which provide end users with access to data and services on the server
A URL consists of different levels. What level is .com in the web address www.google.com?
Host name
Domain name
Very high level domain
Web address
Top-level domain name
Top-level domain name
Which of the following best describes the connection tool for a new smartphone that can connect to Wi-Fi?
Wireless card
Integrated Wi-Fi
Access Point
Hotspot
Integrated Wi-Fi
The wireless access points have a _____ that help share connections
bridge
switch
cable
hub
switch
The transport layer performs data packet creation and what other types of services?
Error checking
Information display
Media connection
Descending layer
Error checking
An NIC is used for which of the following?
Connecting a computer to a network.
Securing a computer in a network.
Connecting a telephone to the network.
Using as a telephone wire.
Connecting a computer to a network.
Which layer is the network layer in the OSI 7 layer model?
2
5
1
3
3
What is a WAN topology?
- WAN topology describes the arrangement concentration routers monitoring the LANs
- WAN topology describes the arrangement by which components within the WAN are organized
- WAN topology describes the arrangement by which the mesh components within the WAN are distributed
- WAN topology describes a system by which the components within the WAN are named
WAN topology describes the arrangement by which components within the WAN are organized
Many family members using the network connection at the same time reduces:
Throughput
Delays
Bandwidth
Theoretical speed
Throughput
Which of the following statements about a VLAN environment is TRUE?
- Access link connections can handle multiple VLAN connections
- Computers or nodes by default are not VLAN aware
- A LAN is a logical setup of a VLAN within a network system
- Trunking is the ability for a port to curtail the number of broadcast packets
Computers or nodes by default are not VLAN aware
How does the use of a router differ from a bridge in telecommunication?
- Routers contain many ports to connect different network segments, while a bridge ensures that requests from within the network for information over the internet are distributed to the correct computer within the network.
- A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
- A router receives electronic signals, cleans and retransmits them at a higher power level, while a bridge receives electronic signals, cleans and retransmits them at a lower power level.
- A router contains many ports to connect different network segments, while a bridge sends data it receives only to specific ports.
A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
A specially built server:
- is a desktop computer with advanced applications
- is built with redundant power supplies to maintain constant availability
- can only serve a limited number of connections on its network
- is more robust with fewer clients connected to it
is built with redundant power supplies to maintain constant availability
Why is the role of RTCP important in VoIP communications?
It connects the VoIP service to the local area network.
It allows the sender to select what type of message to send.
It allows adjustments to be made to fine-tune transmissions.
It allows video packets to be sent between multiple devices.
It allows adjustments to be made to fine-tune transmissions.
What is the primary use for UDP?
Post Office Protocol Version 3
File Transfer Protocol
Telnet
Streaming
Streaming
What is the purpose of FTP?
To open a web site.
To transfer a file in a network.
To establish remote connection.
To start a chat process.
To transfer a file in a network.
MIME not only helped move the email standard forward but helped to make __________ a more enjoyable experience as well.
web browsing
downloading files
texting
logging online
web browsing
One characteristic of MPLS switching is that it _____.
has little control on network traffic
is very inefficient
prevent multiple network hops
prevents network congestion
prevents network congestion
Computers on a network are called:
servers
clients
nodes
switches
nodes
Which acronym refers to the network name that your router broadcasts so you can find it?
WEP
SSID
TKIP
WPA
SSID
What are WLAN Protocols?
- WLAN Protocols are network protocols which govern data transmissions over wide area connectivity.
- WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
- WLAN Protocols are 802.11 protocols which control the speed and frequency coverage over a Wide Area Network (WAN).
- WLAN Protocols are 802.11n/g protocols which control the obstruction and interference over a Wide Area Network (WAN).
WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
The network layer converts:
Logical addresses into physical addresses
Physical addresses into logical addresses
MAC addresses into layers
Layers into MAC addresses
Logical addresses into physical addresses
What kind of channel does broadband transmission use?
Medium pass channel
Bandpass channel
High pass channel
Low pass channel
Bandpass channel
The Internet is defined as _____.
the network of things
the access by individuals to orbital Clouds
the network of networks consisting of millions of devices communicating globally
the internal network connecting two nodes
the network of networks consisting of millions of devices communicating globally
Which of the following is not an application layer protocol?
BOOTP
Telnet
SSH
TCP
TCP
Which device provides access control functionality between networks?
A router
A Network Interface Card
A switch
A printer
A router
Which of the following terms refers to defining the rules for communication between two computers to prevent overload?
flow control
A hardware device that has a built-in network adapter, antenna and radio for Wi-Fi is a(n) _____.
access point
What are the benefits of a DSL network over the previous method known as dial-up?
All answers
The internet is an example of a _____ _____ Network.
wide area
Crosstalk and attenuation are NOT a problem in which of the following media?
fiber optic cable
One of the other protocols that works along with POP is SMTP, which stands for:
simple mail transfer ptotocol
In order to check the nodes that are connected to a system, one can use the command
netstat
Ethernet is an example of which kind of signal topology?
sharedv media access
Which option below best completes this sentence: Among other communicative tasks, the session layer also terminates:
sessions between software process
DNS is an acronym for:
domain name system
Which of the following devices can be used to interface computer networks that use different communication protocols?
gateway
Select the correct definition for a gateway.
the router through which a device can access on external networks
What is Address Translation(AT)?
AT is mappinh private IP addresses to public IP addresses