Objectives 1.1 1.2 1.8 Flashcards

1
Q

Which layer of the OSI model converts data from the application layer into a format that can be sent over the network?

A

The presentation layer converts data from the application layer into a format that can be sent over the network. It also converts data from the session layer into a format the application layer can understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Transport protocols, such as UDP, map to the transport layer of the OSI model and are responsible for transporting data across the network.

A

True. The transport protocols map to the transport layer of the OSI model and are responsible for transporting data across the network. UDP is a transport protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

At what layer of the OSI model do FTP and TFTP map?

A

FTP and TFTP map to the application layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
At which OSI layer does an AP operate?
A. Network
B. Physical
C. Data Link
D. Session
A

C. Data Link

A wireless access point operates at the data link layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following are sublayers of the data link layer? Choose two.
A. MAC
B. LCL
C. Session
D. LLC
A

A. MAC (Media Access Control)

D. LLC Logical Link Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
At which two OSI layers can a switch operate? Choose two. 
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

B. Layer 2 Data Link
C. Layer 3 Network
A switch uses the MAC addresses of connected devices to make its forwarding decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following OSI layers is responsible for establishing connections between two devices?
A. Network
B. Transport
C. Session
D. Data Link
A

B. Transport
The transport layer is responsible for establishing a connection between networked devices. While the Session layer uses protocols to synchronize the data exchange between applications on separate devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 7 layers of the OSI model in order 1-7?

A

Physical, Data Link, Network, Transport, Session, Presentation, Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary function of the Network Layer?

A

Primary function is routing, providing mechanisms by which data can be passed from one network system to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are protocols at the network layer responsible for?

A

Routing protocols provide functionality at the network layer which are software components. Protocols at the network layer are also responsible for route selection which is determining the best path for the data to take throughout the network. Packet describes the logical grouping of data at the network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are static and dynamic routing?

A

In static routing routes are manually added to the routing table. In dynamic routing routing protocols such as Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of the Physical layer?

A

It identifies the network’s physical characteristics including hardware, topology, and protocols. It defines the voltage used on a given medium and the frequency at which the signals that carry the operate which dictates speed and bandwidth of a given medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the basic function of the Transport Layer?

A

Provide mechanisms to transport data between network devices through error checking, service addressing, and segmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is error checking and service addressing and segmentation?

A

Error checking: protocols at the transport layer ensure that data is correctly sent or received.
Service addressing: a number of protocols support many network devices. Transport layer ensures that data is passed to the right service of the upper layers of the OSI model.
Segmentation: Process of breaking packets into manageable sizes for the lower layers to handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the two common methods of flow control in the transport layer.

A

Transport layer controls the data flow which is how the receiving device can accept data transmissions. Two common methods of flow control are Buffering and Windowing.
Buffering: data is temporarily stored and waits for the destination device to become available.
Windowing: In a windowing environment data is sent in groups of segments that require only one acknowledgement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the primary functions of the data link layer?

A

Responsible for getting data to the physical layer so that it can transmit over the network and error detection, error correction, and hardware addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two sublayers of Layer 2 and what do they do?

A

Media access control (MAC): The MAC address is defined at this and also controls access to network media. Logical Link Control (LLC): Responsible for the error and flow control mechanisms of the data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the primary functions of Layer 5?

A

Responsible for managing and controlling the synchronization of data between applications on two devices. It does this by establishing, maintaining, and breaking sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the primary functions of the Presentation Layer?

A

Layer 6 basic function is to convert the data intended for or received from the application layer into another format. Conversion is required because of how data is formatted so that it can be transported across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the primary functions of layer 7?

A

The application layer’s primary function is to take requests and data from the users and pass them to the lower layers of the OSI model. Incoming information is passed to layer 7 which is then displayed to the user. This layer also defines the processes that enable applications to use network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
What layer does each of these devices belong?
A. Switch
B. Router
C. Hub
D. NIC
A

A. Layer 2 or 3
B. Layer 3
C. Layer 1
D. Layer 2

22
Q

With TCP, a data session is established through a three-step process. This is known as a three-way (blank) ?

A

Three-way handshake

23
Q

What FTP command uploads multiple files to the remote host?

A

The “mput” command uploads multiple files to the remote host in FTP.

24
Q

The SSH protocol is a more secure alternative to what protocol?

A

SSH is a more secure alternative to Telnet

25
Q

What ports do the HTTPS, RDP, and DHCP protocols use?

A

HTTPS: 443
RDP: 3389
DHCP: 67/68

26
Q
TCP is an example of what kind of transport protocol?
A. Connection oriented
B. Connection reliant
C. Connection dependent
D. Connectionless
A

A. Connection Oriented

27
Q
Which of the following are considered transport protocols? Choose the two best answers.
A. TCP
B. IP
C. UDP
D. THC
A

A. TCP

C. UDP

28
Q

What is the function of ARP?
A. It resolves MAC addresses to IP addresses.
B. It resolves NetBIOS names to IP addresses.
C. It resolves IP addresses to MAC addresses.
D. It resolves hostnames to IP addresses.

A

C. It resolves IP addresses to MAC addresses.

RARP resolves MAC addresses to IP addresses.

29
Q

What is the function of NTP?
A. It provides a mechanism for the sharing of authentication information.
B. It is used to access shared folders on a Linux system.
C. It is used to communicate utilization information to a central manager.
D. It is used to communicate time synchronization information between systems.

A

D. It is used to communicate time synchronization information between systems.

30
Q
Which of the following protocols offers guaranteed delivery?
A. FTP
B. POP
C. IP
D. TCP
A

D. TCP

31
Q
Which of the following ports are associated with H.323?
A. 443
B. 1720
C. 635
D. 3389
A

B. 1720
443 HTTPS
LDAP 636
RDP 3389

32
Q
By default, which protocol uses port 68?
A. DHCP
B. DNS
C. SMB
D. SMTP
A

A. DHCP
DNS 53
SMB 445
SMTP 25

33
Q
What are SNMP databases called?
A. HOSTS
B. MIBs
C. WINS
D. Agents
A

B. MIBs

34
Q
What are logical groupings of SNMP systems known as?
A. Communities
B. Pairs
C. Mirrors
D. Nodes
A

A. Communities
SNMP communities are logical groupings of systems. When a system is configured as part of a community, it communicates only with other devices that have the same community name.

35
Q
What are two features supported in SNMPv3 and not previous versions?
A. Authentication
B. Dynamic mapping
C. Platform independence
D. Encryption
A

A. Authentication

D. Encryption

36
Q
One of the programmers has asked that DHCP always issue his workstation the same IP address. What feature of DHCP enables you to accomplish this?
A. Stipulation
B. Rider
C. Reservation
D. Provision
A

C. Reservation

37
Q
Which of the following is not a common packet sent during the normal DHCP process?
A. DHCPACK
B. DHCPPROVE
C. DHCPDISCOVER
D. DHCPOFFER
A

B. DHCPPROVE

38
Q
During a discussion with your ISP's technical support representative, he mentions that you might have been using the wrong FQDN. Which TCP/IP-based network service is he referring to?
A. DHCP
B. WINS
C. SNMP
D. DNS
A

D. DNS

DNS is a system that resolves hostnames to IP addresses. FDQN describes the entire hostname.

39
Q
Which DNS record stores additional hostnames, or aliases, for hosts in the domain?
A. ALSO
B. ALIAS
C. CNAME
D. PTR
A

C. CNAME

40
Q
Which DNS record is most commonly used to map hostnames to an IP address for a host with IPv6?
A. A
B. AAAA
C. MX
D. PTR
A

B. AAAA

A = IPv4
MX = Mail Exchange
PTR = Pointer
41
Q
What is the IPv6 equivalent of 127.0.0.1? (Choose two)
A. 0:0:0:0:0:0:1
B. 0:0:0:0:0:0:24
C. ::1
D. ::24
A

A. 0:0:0:0:0:0:1

C. ::1

42
Q
Which of the following is a Class B address?
A. 129.16.12.200
B. 126.15.16.122
C. 211.244.212.5
D. 193.17.101.27
A

A. 129.16.12.200

Class B rang 128 to 191

43
Q

You are the administrator for a network with two Windows Server systems and 65 Windows desktop systems. At 10 a.m, three users call to report that they are experiencing network connectivity problems. Upon investigation, you determine that the DHCP server has failed. How can you tell that the DHCP server failure is the cause of the connectivity problems experienced by the three users?
A. When you check their systems, they have an IP address of 0.0.0.0
B. When you check their systems, they have an IP address in the 192.168.x.x address range.
C. When you check their systems, they have a default gateway value of 255.255.255.255.
D. When you check their systems, they have an IP address from the 169.254.x.x range

A

D.

When a Windows system DHCP fails it gets an APIPA in the 169.254.x.x range

44
Q
Which of the following IP addresses is not from a private address range?
A. 192.168.200.117
B. 172.16.3.204
C. 127.45.112.16
D. 10.27.100.143
A

C. The 127.x.x.x range is reserved for loopback function.

45
Q
You have been assigned to set up a new network with TCP/IP. For the external interfaces, you decide to obtain registered IP addresses from your ISP, but for the internal network, you choose to configure systems by using one of the private address ranges. Of the following address ranges, which one would you not consider?
A. 192.168.0.0 to 192.168.255.255
B. 131.16.0.0 to 131.16.255.255
C. 10.0.0.0 to 10.255.255.255
D. 172.16.0.0 to 172.31.255.255
A

B.

46
Q
You ask your ISP to assign a public IP address for the external interface of your Windows server, which is running a proxy server application. In the email message that contains the information the ISP tells you that you have been assigned the IP address 203.15.226.12/24. When you fill out the subnet mask field on the IP configuration dialog box on your system, what subnet mask should you use?
A. 255.255.255.255
B. 255.255.255.0
C. 255.255.240.0
D. 255.255.255.240
A

B. 255.255.255.0

47
Q

What are the most common distance-vector routing protocols?

A

Distance-vector routing protocols include RIP, RIPv2 and EIGRP. Of these RIPv2 would be the most popular.

48
Q

What are the most common link-state protocols?

A

Link-state protocols include OSPF and IS-IS

49
Q

What is convergence?

A

Convergence represents the time it takes routers to detect change on the network.

50
Q

What term is used when specific routes are combined into one route?

A

The term route aggregation applies when specific routes are combined into one route.

51
Q

True or False: With the help of FSL, STP avoids or eliminates loops on Layer 2 bridges.

A

False. With the help of Spanning Tree algorithm (STA), STP avoids or eliminates loops on a Layer 2 bridge.

52
Q

True or False: With the help of FSL, STP avoids or eliminates loops on Layer 2 bridges.

A

False. With the help of Spanning Tree algorithm (STA), STP avoids or eliminates loops on a Layer 2 bridge.