Objectives 1.1 1.2 1.8 Flashcards
Which layer of the OSI model converts data from the application layer into a format that can be sent over the network?
The presentation layer converts data from the application layer into a format that can be sent over the network. It also converts data from the session layer into a format the application layer can understand.
True or False: Transport protocols, such as UDP, map to the transport layer of the OSI model and are responsible for transporting data across the network.
True. The transport protocols map to the transport layer of the OSI model and are responsible for transporting data across the network. UDP is a transport protocol.
At what layer of the OSI model do FTP and TFTP map?
FTP and TFTP map to the application layer of the OSI model.
At which OSI layer does an AP operate? A. Network B. Physical C. Data Link D. Session
C. Data Link
A wireless access point operates at the data link layer of the OSI model.
Which of the following are sublayers of the data link layer? Choose two. A. MAC B. LCL C. Session D. LLC
A. MAC (Media Access Control)
D. LLC Logical Link Control
At which two OSI layers can a switch operate? Choose two. A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
B. Layer 2 Data Link
C. Layer 3 Network
A switch uses the MAC addresses of connected devices to make its forwarding decisions.
Which of the following OSI layers is responsible for establishing connections between two devices? A. Network B. Transport C. Session D. Data Link
B. Transport
The transport layer is responsible for establishing a connection between networked devices. While the Session layer uses protocols to synchronize the data exchange between applications on separate devices.
What are the 7 layers of the OSI model in order 1-7?
Physical, Data Link, Network, Transport, Session, Presentation, Application
What is the primary function of the Network Layer?
Primary function is routing, providing mechanisms by which data can be passed from one network system to another.
What are protocols at the network layer responsible for?
Routing protocols provide functionality at the network layer which are software components. Protocols at the network layer are also responsible for route selection which is determining the best path for the data to take throughout the network. Packet describes the logical grouping of data at the network layer.
What are static and dynamic routing?
In static routing routes are manually added to the routing table. In dynamic routing routing protocols such as Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) are used.
What is the function of the Physical layer?
It identifies the network’s physical characteristics including hardware, topology, and protocols. It defines the voltage used on a given medium and the frequency at which the signals that carry the operate which dictates speed and bandwidth of a given medium.
What is the basic function of the Transport Layer?
Provide mechanisms to transport data between network devices through error checking, service addressing, and segmentation.
What is error checking and service addressing and segmentation?
Error checking: protocols at the transport layer ensure that data is correctly sent or received.
Service addressing: a number of protocols support many network devices. Transport layer ensures that data is passed to the right service of the upper layers of the OSI model.
Segmentation: Process of breaking packets into manageable sizes for the lower layers to handle.
Explain the two common methods of flow control in the transport layer.
Transport layer controls the data flow which is how the receiving device can accept data transmissions. Two common methods of flow control are Buffering and Windowing.
Buffering: data is temporarily stored and waits for the destination device to become available.
Windowing: In a windowing environment data is sent in groups of segments that require only one acknowledgement.
What are the primary functions of the data link layer?
Responsible for getting data to the physical layer so that it can transmit over the network and error detection, error correction, and hardware addressing.
What are the two sublayers of Layer 2 and what do they do?
Media access control (MAC): The MAC address is defined at this and also controls access to network media. Logical Link Control (LLC): Responsible for the error and flow control mechanisms of the data link layer.
What are the primary functions of Layer 5?
Responsible for managing and controlling the synchronization of data between applications on two devices. It does this by establishing, maintaining, and breaking sessions.
What are the primary functions of the Presentation Layer?
Layer 6 basic function is to convert the data intended for or received from the application layer into another format. Conversion is required because of how data is formatted so that it can be transported across the network.
What are the primary functions of layer 7?
The application layer’s primary function is to take requests and data from the users and pass them to the lower layers of the OSI model. Incoming information is passed to layer 7 which is then displayed to the user. This layer also defines the processes that enable applications to use network services.
What layer does each of these devices belong? A. Switch B. Router C. Hub D. NIC
A. Layer 2 or 3
B. Layer 3
C. Layer 1
D. Layer 2
With TCP, a data session is established through a three-step process. This is known as a three-way (blank) ?
Three-way handshake
What FTP command uploads multiple files to the remote host?
The “mput” command uploads multiple files to the remote host in FTP.
The SSH protocol is a more secure alternative to what protocol?
SSH is a more secure alternative to Telnet
What ports do the HTTPS, RDP, and DHCP protocols use?
HTTPS: 443
RDP: 3389
DHCP: 67/68
TCP is an example of what kind of transport protocol? A. Connection oriented B. Connection reliant C. Connection dependent D. Connectionless
A. Connection Oriented
Which of the following are considered transport protocols? Choose the two best answers. A. TCP B. IP C. UDP D. THC
A. TCP
C. UDP
What is the function of ARP?
A. It resolves MAC addresses to IP addresses.
B. It resolves NetBIOS names to IP addresses.
C. It resolves IP addresses to MAC addresses.
D. It resolves hostnames to IP addresses.
C. It resolves IP addresses to MAC addresses.
RARP resolves MAC addresses to IP addresses.
What is the function of NTP?
A. It provides a mechanism for the sharing of authentication information.
B. It is used to access shared folders on a Linux system.
C. It is used to communicate utilization information to a central manager.
D. It is used to communicate time synchronization information between systems.
D. It is used to communicate time synchronization information between systems.
Which of the following protocols offers guaranteed delivery? A. FTP B. POP C. IP D. TCP
D. TCP
Which of the following ports are associated with H.323? A. 443 B. 1720 C. 635 D. 3389
B. 1720
443 HTTPS
LDAP 636
RDP 3389
By default, which protocol uses port 68? A. DHCP B. DNS C. SMB D. SMTP
A. DHCP
DNS 53
SMB 445
SMTP 25
What are SNMP databases called? A. HOSTS B. MIBs C. WINS D. Agents
B. MIBs
What are logical groupings of SNMP systems known as? A. Communities B. Pairs C. Mirrors D. Nodes
A. Communities
SNMP communities are logical groupings of systems. When a system is configured as part of a community, it communicates only with other devices that have the same community name.
What are two features supported in SNMPv3 and not previous versions? A. Authentication B. Dynamic mapping C. Platform independence D. Encryption
A. Authentication
D. Encryption
One of the programmers has asked that DHCP always issue his workstation the same IP address. What feature of DHCP enables you to accomplish this? A. Stipulation B. Rider C. Reservation D. Provision
C. Reservation
Which of the following is not a common packet sent during the normal DHCP process? A. DHCPACK B. DHCPPROVE C. DHCPDISCOVER D. DHCPOFFER
B. DHCPPROVE
During a discussion with your ISP's technical support representative, he mentions that you might have been using the wrong FQDN. Which TCP/IP-based network service is he referring to? A. DHCP B. WINS C. SNMP D. DNS
D. DNS
DNS is a system that resolves hostnames to IP addresses. FDQN describes the entire hostname.
Which DNS record stores additional hostnames, or aliases, for hosts in the domain? A. ALSO B. ALIAS C. CNAME D. PTR
C. CNAME
Which DNS record is most commonly used to map hostnames to an IP address for a host with IPv6? A. A B. AAAA C. MX D. PTR
B. AAAA
A = IPv4 MX = Mail Exchange PTR = Pointer
What is the IPv6 equivalent of 127.0.0.1? (Choose two) A. 0:0:0:0:0:0:1 B. 0:0:0:0:0:0:24 C. ::1 D. ::24
A. 0:0:0:0:0:0:1
C. ::1
Which of the following is a Class B address? A. 129.16.12.200 B. 126.15.16.122 C. 211.244.212.5 D. 193.17.101.27
A. 129.16.12.200
Class B rang 128 to 191
You are the administrator for a network with two Windows Server systems and 65 Windows desktop systems. At 10 a.m, three users call to report that they are experiencing network connectivity problems. Upon investigation, you determine that the DHCP server has failed. How can you tell that the DHCP server failure is the cause of the connectivity problems experienced by the three users?
A. When you check their systems, they have an IP address of 0.0.0.0
B. When you check their systems, they have an IP address in the 192.168.x.x address range.
C. When you check their systems, they have a default gateway value of 255.255.255.255.
D. When you check their systems, they have an IP address from the 169.254.x.x range
D.
When a Windows system DHCP fails it gets an APIPA in the 169.254.x.x range
Which of the following IP addresses is not from a private address range? A. 192.168.200.117 B. 172.16.3.204 C. 127.45.112.16 D. 10.27.100.143
C. The 127.x.x.x range is reserved for loopback function.
You have been assigned to set up a new network with TCP/IP. For the external interfaces, you decide to obtain registered IP addresses from your ISP, but for the internal network, you choose to configure systems by using one of the private address ranges. Of the following address ranges, which one would you not consider? A. 192.168.0.0 to 192.168.255.255 B. 131.16.0.0 to 131.16.255.255 C. 10.0.0.0 to 10.255.255.255 D. 172.16.0.0 to 172.31.255.255
B.
You ask your ISP to assign a public IP address for the external interface of your Windows server, which is running a proxy server application. In the email message that contains the information the ISP tells you that you have been assigned the IP address 203.15.226.12/24. When you fill out the subnet mask field on the IP configuration dialog box on your system, what subnet mask should you use? A. 255.255.255.255 B. 255.255.255.0 C. 255.255.240.0 D. 255.255.255.240
B. 255.255.255.0
What are the most common distance-vector routing protocols?
Distance-vector routing protocols include RIP, RIPv2 and EIGRP. Of these RIPv2 would be the most popular.
What are the most common link-state protocols?
Link-state protocols include OSPF and IS-IS
What is convergence?
Convergence represents the time it takes routers to detect change on the network.
What term is used when specific routes are combined into one route?
The term route aggregation applies when specific routes are combined into one route.
True or False: With the help of FSL, STP avoids or eliminates loops on Layer 2 bridges.
False. With the help of Spanning Tree algorithm (STA), STP avoids or eliminates loops on a Layer 2 bridge.
True or False: With the help of FSL, STP avoids or eliminates loops on Layer 2 bridges.
False. With the help of Spanning Tree algorithm (STA), STP avoids or eliminates loops on a Layer 2 bridge.