Pass exam take two Flashcards

1
Q

What names pages on the web, gives location and how to access a web page?

A

Uniform Resource Locator(URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the OSI model, the hyperlink uses a(n) _____ to name the pages on the web.

  • Uniform Resource Locator
  • Session Initiation Protocol
  • Domain Name System
  • Open Systems Interconnection
A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the most accurate description of clients in client/server architecture?

  • Desktop computers with a wired connection and laptop computers with a wireless connection
  • All devices connected to a network
  • Hardware devices which provide end users with access to data and services on the server
  • Computers connected to a network used for downloading data from a server
A

Hardware devices which provide end users with access to data and services on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which layer is the application layer on the Open Systems Interconnect (OSI)?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which layer is the presentation layer on the Open Systems Interconnect (OSI)?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which layer is the session layer on the Open Systems Interconnect (OSI)?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which layer is the physical layer on the Open Systems Interconnect (OSI)?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which layer is the datalink layer on the Open Systems Interconnect (OSI)?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which layer is the transport layer on the Open Systems Interconnect (OSI)?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which layer is the network layer on the Open Systems Interconnect (OSI)?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which layer in the OSI model provides access to available network resources?

A

7 - Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which layer in the OSI model translates, encrypts and compresses data?

A

6 - Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which layer establishes, manages and terminates communicative sessions in the OSI model?

A

5 - Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which layer provides reliable proccess-to-process message delivery and error recovery in the OSI model?

A

4 - Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

moves packets from source to destination, by providing internetworking capabilities

A

3 - Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

organizes bits into frames providing node-to-node delivery

A

2 - Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

transmits bits over a medium, establishing mechanical and electrical specifications

A

1 - Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Open Systems Interconnect (OSI)

A

has seven layers that each perform a specific & supportive commincative task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

protocol

presentation layer

A

a standard set of guidelines under which the network operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Presentation Layer functions?

A
  • character-code translation
  • data conversion data compression
  • data encryption and decryption
  • data translation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Presentation layer sub layers?

A

CASE and SASE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

1- CASE

sublayer of presentation layer

A

Common Application Service Element
Provides application layer services and makes service requests of the session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2 - SASE

sublayer of presentation layer

A

Specific Application Service Element

provides application services/protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Networking

A

A grouping of two or more computers being linked together to exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Session Layer (4)
primary responsibilites of session layer protocols are to set up, control, maintain, and close communicative sessions. | Coordinate active applications on various hosts using assigned protocols
26
Network Basic Input/Output System (NETBIOS) | Common Session Layer API
allows applications on separate computers to communicate and establish sessions to access shared resourcs over a local area network (LAN)
27
Transfer Control Protocol/Internet Protocol (TCP/IP) | Common Session/Transport Layer API
Standardizes communications
28
Common Session Layer Protocols | Name 6
1. Network File System (NFS) 2. Structured Query Lanuguage (SQL) 3. Remote Procedure Call (RPC) 4. X Window System 5. AppleTalk Session Protocol (ASP) 6. DEC Session Control Protocol (SCP)
29
**What does layer five of the OSI model do?** * Provides access to available network resources. * Establishes, manages and terminates communicative sessions. * Organizes bits into frames providing node-to-node delivery. * Moves packets from source to destination providing internetworking capabilities.
Session Layer - Establishes, manages and terminates communicative sessions.
30
**The session layer provides communicative support to which two OSI layers?** * Data link and transport * Application and physical * Presentation and transport * Network and application
Presentation and transport
31
**The API that allows applications on separate computers to communicate over a LAN is:** * IP * NetBIOS * TCP/IP * TCP
NetBIOS
32
**Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?** * TCP/IP * IP/NetBIOS * OSI * NetBIOS
TCP/IP
33
the lowest layer in the OSI model and is used for transmitting data in its basic form: bit-level
Physical Layer (1)
34
Physical Layer transmission medium is______ or ______
wired or wireless
35
Physical Layer components in a wired model include ____ | Physical Layer
bolts and connectors to carry data from one place to another by using (cables) electromagnetic signals that translates to a stream of bits **NIC - Network interface cards, connectors and interfaces and cables**
36
Physical Layer components in a wireless model include ____ | Physical Layer
Cellular Wifi and bluetooth
37
Types of cables in networking | Physical Layer
1. Coaxial 2. Sheilded Twisted Pair 3. Unsheilded Twisted Pair
38
Shielded Twisted Pair (STP) | Physical Layer
foil shielding around pairs of twisted wires to prevent electromagnetic interfaces | Acts as a ground to the phone cable to carry data faster
39
Unshielded Twisted Pair (UTP) | Physical Layer
made the same as a shielded twisted pair but without the extra foil shielding around the wire | Most popular commonly used
40
A networking cable that is a wire covered by alternative conducting and insulating shields (more reliable): | Physical Layer
Coaxial Cable | hooks up to modem
41
RJ-45 | Physical Layer
8-wire connectors used specifically for connecting LAN or Ethernet cables | Most common UTP connector cable
42
Fiber ST, SC | Physical Layer
fiber cable connectors that are always used in pairs; one wire is for transmitting data, and the other is for receiving it
43
used for fiber optic cables and transmission of optical signals | Physical Layer
Fiber LC
44
Data transmitted in a single direction in the Physical Layer:
Simplex
45
Half-duplex | Physical Layer
Data can be transmitted in both directions, but not at the same time
46
Full-duplex | Physical Layer
Data can be transmitted in both directions at the same time
47
**Which connector is NOT used in a network cable?** * RJ-11 * Fiber ST * RJ-45 * Fiber LC | Physical Layer (1)
Rj-11
48
**An NIC is used for which of the following?** * Connecting a telephone to the network. * Connecting a computer to a network. * Securing a computer in a network. * Using as a telephone wire. | Physical Layer (1)
Connecting a computer to a network
49
**In the OSI physical layer, data is transmitted in the form of _.** * optical signals * infrared rays * both optical and electromagnetic signals * electromagnetic signals
both optical and electromagnetic signals
50
**What does bandwidth mean?** * Bandwidth is the theoretical minimum speed of your data * Bandwidth is the actual speed of your data * Bandwidth is the theoretical maximum speed of your data * Bandwidth does not apply to network speed
Bandwidth is the theoretical maximum speed of your data
51
**What does throughput mean?** * Throughput is the slowest speed your data can travel on the network * Throughput is the actual amount of data you get in a certain amount of time * Throughput is the delay between the moment you demand data and the time you eventually get it * Throughput is the fastest speed your data can travel on the network
Throughput is the actual amount of data you get in a certain amount of time
52
**Which of these statements is true?** * You should rarely expect delays when you ask for data * Data always travels the same speed on the network * You can expect to get just as much throughput as you ask for * You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
53
What are the 3 basic cable types in networking?
1. Twisted pairs 2. Coaxial 3. Fiber optics
54
Twisted pair cable types (9) | Networking
* Cat1 - Cat5 * Cat5e * Cat6 * CAt6a * Cat7
55
Cat1 - Cat3
Not standard anymore
56
Cat4
* Token ring networks * 16 mbps * range 100 meters
57
CAT5
* Ethernet-based Newtorks * Two twisted pairs * 100 Mbps * range up to 100 meters | Most common in homes
58
Cat 5e
* Four twisted pairs over an ethernet connection * 1000 Mbps * up to 100 meters
59
Cat6, Cat6a, cat7
* four twisted pairs * future standard * 10 gbps * 100 meters
60
Fiber Optic Cables
the new network connection standard and are so fast that they can carry light speeds, thus allowing for gigabit networks Over 1000 mbps More secure than coaxial | thinner, faster, more bandwidth, stays cool, less interference
61
Fiber Optic Cable Types
1. Single - mode 2. Multi - mode 3. Plastic Optical Fiber
62
Single-Mode (SMF)
* used to transmit data over much longer distances than the other two types * high bandwidth/performance * lighter * less bulky * resistance to corrosion * more secure * immune to electromagnetic interference | from city to city
63
* used for sending data over short distances * larger in diameter * less expensive
Multi-Mode (MMF) | office building floor to floor
64
Plastic Optical Fiber
consumer optical fiber cable
65
** Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?** Unshielded twisted pair Fiber optic CAT2 Coaxial
Coaxial
66
** In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?** CAT4 CAT5 CAT7 CAT5e
Cat5e
67
**What is the main purpose of having a twisted pair cable?** To cut down on costs To double the transfer rate of data To make installation easier To reduce electromagnetic interference from outside sources
To reduce electromagnetic interference from outside sources
68
**When internet service providers use fiber optic cables, which cable type are they most likely to use for home networks?** Multi-mode Plastic optical cable Single-mode None of these answer are correct
Plastic optical cable
69
**What is the main advantage of using a shielded twisted pair (STP) cable for a network connection?** To focus the network connection in a large room To cut back on electrical interference There is no advantage to using one To enhance the network connection in a small room
To cut back on electrical interference
70
optical fiber
a very thin strand of plastic or glass that is used to transmit messages via light
71
**The type of fiber used typically for long distance runs is:** Wave-division multiplexing fiber Serial fiber Multi-mode Single-mode
Single-Mode
72
**An advantage of optical fiber over traditional copper wiring is:** Less bulk Lower cost You can pull it tighter It can bend at greater angles than copper
Less bulk
73
User Datagram Protocol (UDP)
David Reed with RFC 768 Speed over efficiency Printers, streaming media, Larger files
74
jenny.myconference.com which is the host name
jenny
75
**URL is an acronym for __________.** Uniform Reference Link Unique Reference Link Uniform Resource Locator Unique Reference Location
Uniform Resource Locator
76
**Access a website by entering the _____ or _____ into the address bar of the Internet browser.** host name, URL domain name, URI HTML, network URL, IP address
URL, IP address
77
Domain Name System (DNS)
* a unique string associated with an IP address * a network of directories on the internet used to resolve host names into machine-readable IP addresses | gingername.com
78
Top name domain servers
.com .org .net
79
**Which of the following statements is true?** Recursive name servers respond to queries from authoritative servers Recursive name servers respond to queries from TLD name servers Authoritative name servers respond to queries from recursive name servers Local DNS cache respond to queries from root servers
Authoritative name servers respond to queries from recursive name servers
80
**_____ is an example of a TLD name.** gingernameclub.com www.gingernameclub.com www.com .com
www.gingernameclub.com
81
**DNS servers use _____ servers to help resolve IP addresses to Domain Names** IP servers Authentication servers Caching servers Authoritative servers
Authoritative servers
82
**Which of the following statements is true when a user first makes a DNS query by typing the domain name into the web browser?** A DNS query answer is returned from the authoritative servers A request is sent to the respective root nameservers A request is sent to an ISP recursive server The local DNS cache is queried
The local DNS cache is queried
83
Prefix identifies what 172.16.254.1
172.16. network
84
IP address
* unique identifier in the field of networking that identifies the physical coordinates of a device that is connected online * dotted-decimal notation * 32 bits total (1 byte = 8 bits) * 172.16.254.1 = 10101100.00010000.11111110.000000001
85
Suffix identifies what 172.16.254.1
254.1 device
86
Routing class A | IP Addresses
0 - 127 | examples 10.1.7.242, 10.253.20.17 ## Footnote For large number of hosts
87
Routing class B | IP Addresses
128-191 | 172.16.47.18, 172.16.250.241 ## Footnote Medium Sized Networks
88
Routing class C | IP Addresses
192-223 | 192.16.1.1, 192.168.45.253 ## Footnote small networks
89
Routing class D | IP Addresses
224-239 | Multi-tasking ## Footnote 227.26.6.173
90
Routing class E | IP Addresses
240-254 | Research and develpment ## Footnote 243.164.89.28
91
IPv4
* more devices than addresses * finite number of addresses * solution non-routable
92
Network Address Translation (NAT) | IP addresses
is used to provide an alias for the device; the router translates that alias back to the device's IP.
93
internet service provider (ISP) | IPv6
gives your home location a physical IP address that can be traced back to your modem via coordinates
94
IPv6 format
* 128 bits (binary digits) * hexadecimal format and 0s 1s * 6e3d:e161:de2a:eb9e:28af:86bc:55a3:e5ce.
95
Fixed Header | IPv6
* Source address * Destination address * Version/IP version * Traffic class * Flow label * Payload length * Next header * Hop limit
96
Source address | IPv6 Header
The original 128-bit source address for an IPv6 node packet.
97
Destination Address | Ipv6 Header
The 128-bit recipient address from the IPv6 node packet.
98
Version/IP version | IPv6 Header
The 4-bit identifier for the version that is being used, in the case of IPv6, that number is going to be 6.
99
Traffic Class | Ipv6 Header
An 8-bit field that is used to determine a packet's level of priority.
100
Flow Label | IPv6 Header
A 20-bit field for defining the packets of the flow. This is useful for the router to determine which packets belong to a particular flow of information. This is mainly used for multimedia or video communications etc.
101
Payload Length | IPv6 Header
A 16-bit field that states the overall length of a packet payload, which can go up to 64 kilobytes if needed.
102
Next Header | IPv6 Header
This indicates the type of extension header (if exists) or the upper layer PDU (such as TCP).
103
Hop Limit | IPv6 Header
An 8-bit field that discards the packet after an absolute limit of time has passed.
104
IPv6 Addressing types | IPv6
* Unicast * Multicast * Anycast * Broadcast
105
Unicast | IPv6 Addressing Types
A packet is delivered only to one interface.
106
Multicast | IPv6 Addressing Types
A packet is delivered to multiple interfaces.
107
Anycast | IPv6 Addressing Types
A packet is delivered to one of the multiple interfaces, but only based on the nearest routing location.
108
Broadcast | IPv6 Addressing Types
This is used in IPv4 to send a single packet to multiple hosts at once. IPv6 does not make use of this technology, making it an old address type not suitable for the future of networking.
109
Is a unique identifier assigned to a computer system (host) on a network with which it can be identified and accessed easily. Simply put, it is the computer **system's name or an alias or domain name**.
Hostname | Hostname Resolution
110
Host file | Hostname resolution
Exists in the ''SYSTEM32\DRIVERS\ETC'' directory under the Windows root directory (i.e., \WINDOWS or \WINNT)
111
Hostname Resolution
Refers to the process through which an assigned hostname is converted or resolved to its mapped IP Address so that networked hosts can communicate with each other.
112
**What protocol do computer systems (hosts) use when communicating with each other on a network?** OSI Models URLs IP Addresses IP Servers
IP Addresses
113
**How are hostnames resolved?** * Hostnames are resolved through an Internationally designated body saddled with the task. * Hostnames are resolved locally and remotely on a servers. * Hostnames are already in-built in the computer systems and hence are resolved on their own. * Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.
Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.
114
* **Why is it necessary for computer systems (hosts) to have a hostname or domain name?** * It is necessary because it is an international standard which must be followed. * It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed. * It is necessary because every device has a name and so this should not be different. * It is necessary because it differentiates it from other people's computer systems.
It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
115
**What is a hostname or domain name used for?** * It is a name given to a website and the server. * It is used for naming a device or computer system. * It is used to uniquely identify a computer system (host) located on a computer network for easy referencing. * It is a security requirement.
It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.
116
**What is Hostname Resolution?** * It is the process through which hostnames are reserved for use on another network. * It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes. * It is the process through which hosts on a network communicate with another. * It is the process through which hostnames are separated from each other using a router.
It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes.
117
addresses work along with IP addresses on a network device for communication. The device must have the necessary functioning hardware to communicate on the network. **With NIC**
**Media Access Control (MAC)**
118
MAC address
* NIC 48 bit numbers * The MAC address is a hardwired number, permanent and unique to a device's NIC. * example 00-14-22-01-23-45
119
**How does the MAC Address differ from an IP address?** * The MAC address operates in the Network layer of the TCP/IP stack. * The MAC address is a hardwired number, permanent and unique to a device's NIC. * The MAC address carries only network addressing information. * The MAC address is dynamically assigned each time a device establishes a new connection in a network.
The MAC address is a hardwired number, permanent and unique to a device's NIC.
120
**IP Addresses operate within the _ layer of the TCP/IP protocol.** Data Link Layer Application Layer Physical Layer Network Layer
Network Layer
121
**What is an IP address?** * An IP (Internet Protocol) address is used to identify a computer. * An IP (Internet Protocol) address is used to identify a NIC. * An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment. * An IP (Internet Protocol) address is a series of hardwired numbers which is used to identify a network environment.
An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment.
122
**Which of the following statements is true?** * NICs are hardwired with IP and MAC addresses. * MAC and IP addresses need to work in parallel for effective communication. * MAC and IP addresses can both work independently depending on the environment. * MAC addresses can route data packets over the internet independent of IP addresses.
MAC and IP addresses need to work in parallel for effective communication.
123
**Why are addresses important in networking?** * They identify the layers in the TCP/IP Stack. * They are used to reveal the name of the device. * They are used to identify both the network to which the device is connected to as well as the device itself. * They are used to establish the network layer of the operating environment.
They are used to identify both the network to which the device is connected to as well as the device itself.
124
IPv4 (Internet Protocol version 4)
125
Advanced Research Project Agency or ARPA developed ARPANET
(later known as DARPA due to defense contracts) and began working on networking in the late '60s.
126
The Network Control Protocol
which was the predecessor to TCP/IP v4, was created by ARPANET and first used in 1971.
127
TCP/IP v4
was finalized in 1981 as part of RFC 791.
128
**What is variable length subnet masking used for?** * It allows an IP address space to be divided into subnets of different sizes. * It is used to introduce complexity to networks. * It is used to issue addresses to systems. * It is used to make numbers larger.
It allows an IP address space to be divided into subnets of different sizes.
129
**Who was responsible for the creation of IPv4 protocols?** IBM Lycos DARPA Google
DARPA
130
A class A network has how many network bits set to on? 8 16 24 3
8
131
**In dotted decimal, which network numbering segment is reserved for loopback? ** 192.168.x.x 172.x.x.x 127.x.x.x 0.x.x.x
127.x.x.x
132
Network Address Translation (NAT)/Address Translation (AT)
is a system of assigning public and private IP addresses to computers within an internet network system in order to facilitate the transfer of data to and from the internet
133
Basic NAT
one-to-one mapping (1:1 mapping)
134
One-to-Many NAT
assigns one private, or internal IP address, to not just one internal host device, but an entire private network of internal host devices.
135
one-to-one mapping translation. It assigns one private IP address to one public IP address. This will be the permanent address for that device.
Static NAT (SNAT)
136
Dynamic NAT (DNAT)
eliminates the limitation of only one IP address creation per device. Instead, it collects a pool of pre-created, public IP addresses that a private IP address can be translated into when needed.
137
most common type of NAT. This type of translation has several different names, such as overloading, NAT overload, or one-to-many mapping, as discussed.
Port Address Translation. As the name communicates, PAT allows for an overload, or multiple private IP addresses to be translated into a single public IP address.
138
**The different types of Address Translations are ______** * Statin Network Address Translation, Dynamic Network Address Translation. Support Address Translation * Gateway Network Address Translation, Dynamic Network Address Translation. Web Address Translation * Static Network Address Translation, Dynamic Network Address Translation. Port Address Translation * Static Network Address Transformation Dynamic Network Address Transformation. Port Address Translation
Static Network Address Translation, Dynamic Network Address Translation. Port Address Translation
139
**NAT serves which two main purposes?** * Protecting the public network from the Internet and conserving the availability of public IP addresses. * Protecting the private network from the public domain and conserving the dynamic public IP addresses. * Protecting the private network from the public domain and conserving the availability of public IP addresses. * Protecting the public network from the private domain and conserving the availability of static IP addresses.
Protecting the private network from the public domain and conserving the availability of public IP addresses.
140
**In a company setup where users are required to work from home when needed, what is the best address translation?** Port Address Translation Dynamic NAT Static NAT NAT
Static NAT
141
**If a company with a very low budget needs to lease a public IP address to access the Internet what would you advise and why?** * Static NAT would be their best option as it would enable them to access their computers remotely. * Employing a single ISP would be the best option. they sign up for the public Ip addresses they need * Port Address Translation would be their best option as they can pay for a single public IP address and share among the nodes within the network * Dynamic NAT would be their best option as they can pay for a single public IP address and share among the nodes within the network. The address would be available to any user on demand.
Port Address Translation would be their best option as they can pay for a single public IP address and share among the nodes within the network
142
**What is Address Translation(AT)?** * AT is converting public IP addresses into private IP addresses * AT is transposing private IP addresses into public IP addresses * AT is converting private IP addresses into public IP addresses * AT is mapping private IP addresses to public IP addresses
AT is mapping private IP addresses to public IP addresses
143
Routing Information Protocol (RIP)
standard used by routers that dictates how data should be shared between a group of individual networks, otherwise known as Local Area Networks. **Using Hops**
144
hops
the path a data packet travels through to reach each router, as a way to measure which route is most efficient.
145
routing table
All routers that utilize RIP contain a dynamic list of all the destinations it can send data to.
146
Routing Information Protocol (RIP) Versions
RIP Version 1 utilizes classful routing whereas RIP Version 2 uses classless routing.
147
Classful routing | RIP Versions
refers to protocols that **do not carry a subnet mask,** a set number of available IP addresses available in a network.
148
classless routing
**does** carry subnet masks
149
**Which of the following types of routing do NOT carry a subnet mask?** * Classless routing * Routing tables * None of these * Classful routing
Classful routing
150
**Which of the following best defines the Routing Information Protocol?** * It is a standard that determines what information is most valuable to an end user. * It is a way for computers to manage their hard drives. * It is a method for preventing hackers from infiltrating a network. * It is a standard used by routers that dictates how data should be shared between a group of individual networks.
It is a standard used by routers that dictates how data should be shared between a group of individual networks.
151
**Which of the following refers to the path a data packet travels through to reach each router?** Routes Jumps Skips Hops
Hops
152
**What is the difference between RIPv1 and RIPv2?** * RIPv1 utilizes classful routing whereas RIPv2 uses classless routing. * RIPv1 uses classless routing, but RIPv2 uses classful routing. * RIPv1 and RIPv2 each have their own routing protocol. * RIPv1 uses the Routing Information Protocol and RIPv2 does not.
RIPv1 utilizes classful routing whereas RIPv2 uses classless routing.
153
**Select the term that best completes the sentence.** **RIP routers contain _, a dynamic list of destinations that it can send data to.** routing tables routes hops classful routing
routing tables
154
is a device that is used to create a network of computers and other devices.
switch
155
Central Processing Unit | switch architecture
responsible for **handling all of the basic instructions on the device.** The CPU is akin to how your **brain** is responsible for sending signals throughout your body to do things like walking, taking a deep breath, blinking, eating and so on.
156
Forwarding Engine | switch architecture
component that is responsible for making all of the switching and routing decisions on the device.
157
Switch Fabric | switch architecture
comprised of hardware and software that work in tandem to ensure that data coming into the network gets sent out via the appropriate port.
158
Controllers and Buffers | swtich architecture
**controller** is similar to a CPU, but its main focus is controlling tasks such as clocking. **buffers** are used to prevent data packets from clogging up the network path.
159
ROM and RAM | swtich architecture
ROM is able to store data even without power, whereas RAM cannot.
160
**ROM** | swtich architecture
short for Read-Only Memory, is responsible for the switch's long-term memory.
161
What type of memory handles the switch's short-term memory in the switch architecture?.
**RAM**
162
Ports
connect devices together
163
**Which two components enable a switch fabric to operate?** CPU and Controller Controller and Buffers ROM and RAM Forwarding and Replication Engines
Controller and Buffers
164
**Which of the following is responsible for the switch's long-term memory?** CPU Ports RAM ROM
ROM
165
**A _ is a device that is used to create a network of computers and other devices.** CPU Replication Engine switch Switch Fabric
Switch
166
**Which switch component allows for devices to be connected to the switch?** Switch Fabric Ports RAM Forwarding Engine
Ports
167
**Which of the following is NOT a component of a network switch?** CPU Replication Engine Bypass Engine Switch Fabric
Bypass Engine
168
Internet Message Access Protocol (IMAP)
is a standard internet protocol used for the retrieval of email messages from an email server. I
169
IMAP Port Access
a logical point of connection to the internet
170
**One of the most common applications of IMAP is:** * Accessing and managing paired sharing platforms. * Accessing and managing shared and system folders. * Enabling data communications over a packet switched network on multiple devices. * Accessing and managing shared and public folders.
Accessing and managing shared and public folders. | multiple people can have access to the same mailbox
171
**IMAP can allow a user with multiple devices to _____** * access their emails simultaneously from any of the devices. * access the protocol simultaneously from any of the devices. * consolidate system updates on all devices. * synchronize playback of multimedia from all devices.**
access their emails simultaneously from any of the devices.
172
**IMAP is the vehicle by which _** * client applications are moved, organized and manipulated between the mail server and the mail client application * compatibility updates are synchronized between Outlook and other email servers. * synchronization is achieved between email clients and ISPs. * messages are moved, organized and manipulated between the mail server and the mail client application.
messages are moved, organized and manipulated between the mail server and the mail client application.
173
**What is IMAP?** * (IMAP) is a standard internet protocol used for the retrieval of email messages from an email server. * (IMAP) is a standard internet protocol used for data packets and addressing schemes for computers to communicate over the internet. * (IMAP) is a standard internet protocol used for email packets and addressing schemes. * (IMAP) is a standard logical connection used for the retrieval of email packets between applications.
(IMAP) is a standard internet protocol used for the retrieval of email messages from an email server.
174
**The secure logical connection to which IMAP is bound to connect to the internet is _** * Port 143 * Logic 993 * Port 993 * Part 143
175
**networking commands**
are used at the command prompt to get network information like the IP address of the system (remember that an IP address is the address of your device in a network), MAC address, network route traversed by a packet, and the IP address of the server in which a website or URL is hosted.
176
Network Command Types (7)
* ipconfig * ifconfig * tracert * ping * netstat * nslookup * getmac
177
which is used for finding the IP address and default gateway of your network. | Network Command Types (7)
**ipconfig command**
178
| Network Command Types (7)
179
**ifconfig command** | Network Command Types (7)
which is mainly used to find an address to a network interface and to configure or display current network interface configuration information of a system.
180
**tracert command** | Network Command Types (7)
which is used to get an insight to the network route followed when a machine connected to a network tries to access a server on which a particular website is hosted.
181
**ping command** | Network Command Types (7)
which is typically used for checking the network connectivity from your system to an end device like a server or a printer and also of a website.
182
**netstat command** | Network Command Types (7)
which is used for displaying the active connections and ports which are connected to the current machine.
183
**nslookup command** | Network Command Types (7)
which is used for diagnosing the Domain Name System (DNS) infrastructure.
184
** getmac command** | Network Command Types (7)
which is used to find a computer's MAC address. Remember that a media access control (MAC) address is a unique physical address of a computer, which is assigned specifically by the manufacturers of that computer.
185
**In order to check the nodes that are connected to a system, one can use the command** netstat ping nslookup tracert
netstat
186
**What is the result of entering nslookup command in the command prompt?** IP address of the host server MAC address of the system IP address of the system MAC address of the host server
IP address of the host server
187
**Which command helps to identify whether a given system is connected to a network?** ifconfig getmac ping netstat
ping
188
refers to the layout patterns of the interconnections between computers in a network. It is also referred to as network architecture. | Network topology
Network topology
189
Point-to-Point | Network topology
is the** simplest **of all the network topologies. The network consists of a **direct link between two computers**. This is **faster and more reliable** than other types of connections since there is a direct connection
190
Bus | Network topology
uses **one main cable to which all nodes are directly connected**. The main cable acts as a **backbone** for the network. One of the computers in the network typically acts as the computer server. The first advantage of bus topology is that it is **easy to connect a computer or peripheral device**. The second advantage is that the cable requirements are **relatively small, resulting in lower cost**.
191
Star | Network topology
each computer is connected to a central hub using a point-to-point connection
192
Ring | Network topology
the computers in the network are connected in a circular fashion, and the data travels in one direction.
193
Mesh | Network topology
every node has a **direct point-to-point connection to *every other* node**. Because all connections are direct, the network can handle very **high-volume traffic**. It is also robust because if ***one connection fails, the others remain intact***. Security is also high since data travels along a dedicated connection.
194
combines **multiple star topologies onto a bus**. Hub devices for each star topology are connected to the bus. Each hub is like the root of a tree of devices. This provides great flexibility for expanding and modifying the network. | Network topology
Tree
195
Hybrid | Network topology
combination of two or more topologies. Hybrid networks provide a lot of flexibility, and as a result, they have become the most widely used type of topology. Common examples are **star ring networks and star bus networks**. Tree topology is one specific example of a star bus network.
196
**Consider a number of computers are in a network, and one computer crashes. In which of the following network topologies will the entire network also go down?** Star Ring Mesh Tree Bus
Ring
197
Topology
arrangement in which various network devices or network systems are connected.
198
describes the actual or the physical layout of a network, such as the physical arrangement of wires, media (computers), or cables in a network. * bus * mesh * star * ring
**Physical topology**
199
path taken by the various signals in networking
signal topology
200
Token-based | physical topology
access requires authentication before accessing and sharing data
201
**shared media access** | physical topology
requires no authentication, and thus any computer in the network can share data without restrictions, which can cause collisions at various signal nodes.
202
** Ethernet** | physical topology
is an example of shared media access.
203
Logical topology
indicates how various hosts within a network communicate across the medium, i.e., it exhibits how data or signals in a network flow.
204
Broadcast topology | logical topology type
This topology allows a host to send data to all other hosts available in that network. No order or restrictions are observed among the hosts regarding sharing data.
205
Token-passing topology | logical topology type
This topology only allows the sharing of data to hosts through the access of an electronic token. This token is typically shared with each host in an orderly way. However, if one host has no data to share, the electronic token is passed to the next host in the sequence.
206
**The _ of a network describes how the connections appear to the end user or how signals are passed across the network.** * physical topology * protocol suite * signal pattern * logical topology
logical topology
207
**Ethernet is an example of which kind of signal topology?** * shared media access * token-based access * wireless * switch based
Shared Media Access
208
**The _ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.** diagram electrical physical logical
209
Network switching
is the process of channeling data received from any number of input ports to another designated port that will transmit the data to its desired destination.
210
Circuit switching
is defined as the establishment of a dedicated communication path between the two parties, or nodes, within a physical network.
211
Packet switching
is defined as the process of breaking down messages into small components, called packets.
212
multi-protocol label switching (MPLS)
the ability for the intermediate routers to make these independent decisions are eliminated. MPLS is a network routing mechanism that directs packets to their final destination using an assigned label.
213
**The label in multi-protocol label switching contains _.** * the routers ingress and egress routing information * information on the predefined path for the packets to reach their destination * complete routing table information * the ingress and exit router information
information on the predefined path for the packets to reach their destination
214
**In MPLS switching, the routing decision is made _.** * at each network hop * by the first routing device and forms the predefined path for subsequent routers * by the exit routing device and forms the predefined path for ingress * when the path is set up across the network
by the first routing device and forms the predefined path for subsequent routers
215
**One characteristic of MPLS switching is that it _.** is very inefficient prevent multiple network hops prevents network congestion has little control on network traffic
prevents network congestion
216
**The difference between circuit switching and packet switching is _.** * circuit switching uses destination labels, while packet switching uses routing labels * with circuit switching the whole message is transmitted as one using a dedicated path, while with packet switching the message is broken down into small components called packets * circuit switching is more vulnerable to network congestion than packet switching * with circuit switching the message components takes independent paths to their final destination, while with packet switching the message takes one path to the final destination
with circuit switching the whole message is transmitted as one using a dedicated path, while with packet switching the message is broken down into small components called packets
217
**What is network switching?** * The process of labeling network hops from any number of input ports to another designated port * The process of channeling data messages or data packets received from any number of input ports to another designated port that will transmit the data to its desired destination * A switching device that controls the volume of network traffic in a system * The process of channeling network routers received from any number of input ports to another designated port that will transmit the router to its desired destination
The process of channeling data messages or data packets received from any number of input ports to another designated port that will transmit the data to its desired destination
218
Ethernet
is the most commonly used LAN technology. It dictates the technical specifications of hardware for connectivity; the number of connections permitted, performance thresholds and the overall framework that governs data transmission(types of vehicles, maximum height and speed limit).
219
Carrier Sense Multiple Access/ Collision Detection (CSMA/CD)
One of the main standards of the Ethernet technology
220
Fast Ethernet standard
IEEE 802.3u 1. 100 Base - TX 2. 100 Base - FX 3. 100 Base - T
221
What type of ethernet is the following? 1. 10 GBase - SR 2. 10 GBase - LX4 3. 10 GBase - SW/LW/EW
Gigabit Ethernet
222
The unit of data which is carried by an Ethernet Link in the Network Access layer
Ethernet Frame
223
Ethernet Frame header
which contains details of the source and destination MAC addresses,
224
Frame Check Sequence
The middle section, which contains the packet data and the frames last section
225
**Ethernet is the _.** * Unit of data which is carried by an Ethernet Link by the Network Access layer * LAN technology that dictates geographical specifications of networks worldwide * Protocol which which waits for the channel to be idle then transmits data * LAN technology that dictates the technical specifications of hardware for connectivity
LAN technology that dictates the technical specifications of hardware for connectivity
226
**The Frame Check Sequence (FCS) within an Ethernet frame serves to _** Meet the VoIP needs over the channel Detect data collision Detect corrupted data Identify the transmitting device
Detect corrupted data
227
**Ethernet usually permits each node in the network to transmit data packets at any time which can cause _** Error correction Data collision Multiple Access Data re-transmission
Data collision
228
**What Ethernet Standard Specification is suitable for a network requiring 100 Mbps speed and 2000 max cable distance?** 100 Base - FX 10 GBase - SW 100 Base - TX 10 GBase - LX4
100 Base - FX
229
LAN Card
is the network interface card that is used by the device to communicate with the network. LAN Cards can be classified as wireless or wired. Wired LAN Cards are also called conductive LAN Cards.
230
Wireless LAN Cards
generally will have some sort of an external antenna and will utilize Wi-Fi protocols to connect to the network
231
Integrated LAN Cards
Most modern motherboards have a LAN Card integrated into the motherboard circuitry.
232
PCMCIA
laptops used slots, also known as PC Card slots, that could allow for the connection of a wired or wireless LAN Card.
233
Integrated Wi-Fi: NIC Card
modern laptops have an integrated LAN Card, and many have both a Wi-Fi and an Ethernet interface.
234
a computer network describes the material substances that carry energy waves, which include the data being transferred.
transmission media
235
Repeater | Telecommunications Hardware
a device that receives electronic signals, cleans them and retransmits them at a higher power level. Signals transmitted over cable tend to degrade over long distances
236
Hub | Telecommunications Hardware
a networking device used to connect multiple devices directly to the network using cables. Each connection is called a 'port.' The connections typically consist of a fiber optic Ethernet cable.
237
Switches | Telecommunications Hardware
contain many ports to connect different network segments. They are similar to hubs, but offer greater performance.
238
networking devices that divide up the network into different segments to manage the amount of traffic | Telecommunications Hardware
Bridges
239
Routers | Telecommunications Hardware
communication devices used to connect two different networks
240
Gateway | Telecommunications Hardware
interfaces networks that use different protocols
241
What modulates and demodulates data signals?
Modems
242
is a piece of hardware that allows individual computers to physically connect to a network.
**network interface card (NIC)** An NIC contains the electronic circuitry required for a wired connection (Ethernet) or a wireless connection (Wi-Fi).
243
**How does the use of a router differ from a bridge in telecommunication?** * A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic. * Routers contain many ports to connect different network segments, while a bridge ensures that requests from within the network for information over the internet are distributed to the correct computer within the network. * A router receives electronic signals, cleans and retransmits them at a higher power level, while a bridge receives electronic signals, cleans and retransmits them at a lower power level. * A router contains many ports to connect different network segments, while a bridge sends data it receives only to specific ports.
A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
244
**Which of the following devices can be used to interface computer networks that use different communication protocols?** Router Repeater Gateway Hub
Gateway
245
**Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports?** Gateway Hub Router Switch
Switch
246
**What type of hardware device is a WiFi card?** A special card that gives you free access to WiFi hotspots A device that encrypts a signal before it is transmitted over a WiFi connection A port on a computer to plug in a WiFi cable A network interface card to establish a wireless connection
A network interface card to establish a wireless connection
247
Wide Area Network, or WAN,
is used to connect physically separated locations on a network. WANs can connect buildings that are across town or across the world on the same network. * Cost * Performance * Reliability * Resiliency
248
Hub and Spoke | WAN Design
design technique where remote or branch office locations are all connected to the main location using a single point-to-point connection.
249
Full Mesh Network Topology | WAN Design
To remedy the deficiencies of the hub and spoke WAN
250
Common carriers for WAN
1. MPLS 1. Dedicated Lines 1. Frame Relay (discontinued) 1. Ethernet 1. SD-WAN 1. Dark Fiber
251
**Of the options listed, which is the most used WAN (Wide Area Network) carrier?** Dedicated Lines Frame Relay MPLS Dark Fiber
MPLS
252
**What are two common WAN (Wide Area Network) design types?** Main input; Redundant Input Remote singular; Integrated topology Hub and spoke; Full mesh topology MPLS; SD-WAN
Hub and spoke; Full mesh topology
253
**If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?** A hub and spoke design. A bus design. A full mesh design. A star design.
A full mesh design.
254
Wide Area Network (WAN)
is a communication network of devices, which spans geographical areas. It's an interconnection across geographical locations, of multiple *Local Area Networks (LANs),* which are small communication networks in the same locality.
255
Network topology
describes the arrangement by which the components of networks (LANs or WANs) are organized.
256
ring topology
Network traffic can be routed in both directions. This makes this topology less vulnerable than the bus topology. If a line connection fails, traffic is rerouted in the opposite direction and communication is not lost.
257
star topology
the sites are arranged in a star formation. There is a central hub and each site is connected directly to the hub.
258
mesh topology
every device belonging to the network is connected to every other device in a mesh formation.
259
tiered topology
entails the interconnection of clusters of star network WANs by the use of concentration routers.
260
**In WANs, which of the following is NOT a characteristic of mesh topology?** * Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites * Implementation incurs high costs * Data transmissions are carried out via multiple routes * All sites are connected to each other
Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
261
**What is a WAN topology?** * WAN topology describes the arrangement concentration routers monitoring the LANs * WAN topology describes a system by which the components within the WAN are named * WAN topology describes the arrangement by which components within the WAN are organized * WAN topology describes the arrangement by which the mesh components within the WAN are distributed
WAN topology describes the arrangement by which components within the WAN are organized.
262
**Four types of WAN topologies are _** * Mesh, star, ring, bus topologies * Ring, star, teared, mess topologies * Bus, ring, stay, tiered topologies * Mesh, rind, star, tiered topologies
Mesh, star, ring, bus topologies
263
**Which network topology uses concentration routers to interconnect star network WANs?** Tiered topology Mesh topology Ring topology Bus topology
Tiered topology
264
**In WANs, what advantage does the ring topology have over the bus topology?** Concentration servers stabilize data transmission Data transmission is multidirectional It is hardware intensive and so implementation is expensive Adding and removing nodes is easy
Data transmission is multidirectional
265
DSL (Digital Subscriber Line)
* like dial-up, it also used the same phone line connector cable. * DSL over dial-up is that it offers the user a much higher rate of speed
266
DSL Asymmetric
(higher download speeds with lower upload speeds)
267
DSL Symmetric
equal download and upload speeds).
268
**What is one of the major differences between a DSL network and a cable network?** * DSL only worked well if the modem was close to the main service area, cable does not have such restrictions. * All of these answers are correct. * DSL was more expensive to implement than cable. * DSL is more stable and reliable than cable.
DSL only worked well if the modem was close to the main service area, cable does not have such restrictions.
269
**What is a unique downside that consumers face with a traditional cable network connection versus that of DSL?** * Overall network stability and reliability are lower. * The cost per month of service is higher. * Surrounding neighbors can affect the network bandwidth during peak hours. * None of these answers are correct.
Surrounding neighbors can affect the network bandwidth during peak hours.
270
**What are the benefits of a DSL network over the previous method known as dial-up?** * All of these answers are correct. * Having much higher network speeds overall. * Being able to talk on the phone and surf the web at the same time. * Much more stability in terms of network reliability.
All of these answers are correct.
271
Short-range wireless communication
uses signals that travel very short distances, from a few centimeters to several meters. Examples include Bluetooth, infrared and Zigbee.
272
Medium-range wireless communication
uses signals that travel up to 100 meters or so. The most widely used type is Wireless Fidelity, or Wi-Fi.
273
Wide area wireless communication
uses signals that travel quite far, from several kilometers to several thousand kilometers. Examples include cellular and satellite communications.
274
mobile phone
is an electronic device to make and receive phone calls over a radio link while moving through an area.
275
tablet computer, or simply a tablet,
is a mobile computer where all components are integrated into a single unit.
276
personal digital assistant, or PDA,
is a mobile device that is dedicated to managing personal information.
277
satellite phone
allows you to make a phone call anywhere in the world by using two-way communication with satellites specifically designed for this purpose.
278
Global Positioning System, or GPS unit,
is an electronic device that receives signals from a collection of GPS satellites and uses this information to calculate your location.
279
Bluetooth
is a type of wireless communication used to transmit voice and data at high speeds using radio waves.
280
Infrared (IR) light
is electromagnetic radiation with wavelengths that are just beyond those of visible light.
281
Zigbee
is a wireless communication technology for short-range, low-power digital radio communications.
282
Ultra-wideband, or UWB,
is a short-range communication technology that uses extremely short magnetic pulses.
283
Near field communication, or NFC,
is a very short-range communication technology for things like consumer electronics, mobile phones and credit cards. Devices have to be in very close proximity, typically a few centimeters.
284
**Which of the following is not a typical application of Bluetooth wireless communication?** * Hands-free calling by connecting a mobile phone to a car's stereo system * Wireless connection between a computer and peripheral devices (e.g mouse, keyboard, camera, printer) * Wireless headset for a mobile phone * Connecting several devices to the wireless Internet.
Connecting several devices to the wireless Internet.
285
**Relative to other technologies such as Bluetooth, WiFi and cellular, Zigbee provides wireless communication that provides _.** Longer battery life Longer range and lower cost Lower cost Lower cost and longer battery life
Lower cost and longer battery life
286
**What is the approximate distance between devices when establishing a connection using short-range wireless communication?** * 1 to 100 meters * From a few centimeters to approximately 1 kilometer * 3 to 5 meters * From a few centimeters to several meters
From a few centimeters to several meters
287
A set of network devices (for example workstations) that look as though they are connected through the same network and thus share the same broadcast domain.
Virtual Local Area Network (VLAN)
288
the network administrator must physically set individual ports on a switch to point to a specific VLAN. This provides only a single option - forwarding the ports on a switch to a specific VLAN - which is good for general purposes.
static VLAN environment,
289
gives the network administrator more flexibility to set up a more advanced network. For example, being able to specify user account names instead of specific ports allows for more finely tuned control over the network.
dynamic VLAN environment
290
**In a _ VLAN, the network administrator must set the ports on a switch to forward the traffic to a specific VLAN.** static single double dynamic
static
291
**A _____ is a group of network devices that look like they are all connected to a single network even if they are not in the same location.** VLAN All of these answers are correct. Router Modem
VLAN
292
**A VLAN is created by multiple _ that forwards all network traffic to other locations.** routers All of these answers are correct. modems switches
switches
293
is one of the oldest remote access methods, as old as the Internet itself. Telnet dates back to 1969 and was designed for the fledgling ARPANET,
Telnet
294
makes remote connections more robust over unreliable connections for laptops, tablets smarphones, wifi cellular
Mosh, or Mobile Shell,
295
VPN, or Virtual Private Network,
is another popular remote access method. It aims to give remote employees access to company resources such as email, wikis, content management systems or customer relationship management systems as if they were on a company intranet.
296
**What access method works best over mobile connections?** SSH. VPN. Telnet. Mosh.
Mosh
297
**What main use does Telnet have in modern IT?** Telnet is often used for embedded devices. Telnet offers remote access to Intranet resources. Telnet is used for fun things like games. Telnet is used for secure access to remote computers.
Telnet is often used for embedded devices.
298
**What makes Mosh an alternative to SSH?** * Mosh is faster than SSH. * Mosh can reconnect if a wireless connection gets interrupted. * Mosh is easier to set up than SSH. * Mosh is more secure than SSH.
Mosh can reconnect if a wireless connection gets interrupted.
299
**Why is Telnet discouraged as an access method?** It's very old. Telnet only uses text. Telnet is slow. Telnet is unsecure.
Telnet is unsecure.
300
The countermeasures that are implemented on a network to keep the network and data safe from hackers, fraudsters, criminals, and negligent employees.
network security
301
Hardware appliances
are special servers or network equipment that perform a specific network security function.
302
network security software can be installed on
servers or PCs to enable network protection functions.
303
This type of network security is provided to your company as a service and is often called a
cloud service
304
**If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?** IPS/IDS Web content filter DLP DDoS protection
DLP
305
**When can a network security hardware appliance stop threats on the network?** * When it is installed in line. * It can stop threats whether it is installed in or out of line. * It can never stop threats. * When it is installed out of line.
When it is installed in line.
306
Data loss prevention (DLP)
is a technology that is normally integrated into a firewall or other security systems. It uses pattern recognition to prevent sensitive data from leaving the corporate network.
307
Business Continuity:
Effective network security measures contribute to business continuity by minimizing the impact of cyberattacks and disruptions. A secure network ensures that critical services and resources remain available even during security incidents.
308
_______is a technique that allows potentially harmful software to be executed in a controlled, isolated environment. It enables the analysis of the software's behavior without affecting the main network. Sandboxing helps identify and prevent the spread of malware and zero-day threats by containing them within a safe environment.
Sandboxing
309
________ involves dividing a network into smaller, isolated subnetworks. Each segment operates independently, limiting the impact of potential security breaches. It enhances network performance, isolates sensitive data, and reduces the attack surface, making it more difficult for attackers to move laterally within the network.
Network segmentation
310
**Which of the following is NOT one of the core elements of network security?** Privacy Integrity Availability Confidentiality
Privacy
311
**In addition to network security operators, who might be involved with network security?** Construction engineers Lawyers Locksmiths All of the answers are correct.
Locksmiths
312
**Which of the following is NOT an element of access in regards to network security?** Accounting Authorization Authentication Availability
Availability
313
Network security,
as a whole, refers to all attempts to protect the usability, integrity, and safety of your electronic data and network.
314
repudiate
means to deny or contest something
315
non-repudiation
must be the ability to ensure that someone cannot deny or contest that thing. * certified mail * notary public * read reciept * Digital signatures * Biometrics * Confirmation services * Timestamps * Digital certifcates * public key infrastructure
316
__ is a technology that delivers video services from one device to another over a computer network which are connected to the internet.
Video-Over IP
317
______which describes methods or protocols used to distribute data between two or more devices.
Internet Protocol
318
The primary transfer protocols of TCP/IP protocol stack are the
1. Transmission Control Protocol (TCP) 2. the User Datagram Protocol (UDP).
319
Characteristics of Video-Over IP
1. scalability 2. no distance limitations 3. cost saving 4. provides power over ethernet 5. reduce bandwidth for compressoin, transmission and storage
320
Streaming Video
Live Streaming On demand Streaming Download and play
321
The latest video compression format is _____. MPEG JPEG H.323 H.264
H.264
322
provide a way to send and receive the voice or video messages from one device to another.
Transport protocols
323
What is the part of the transport protocol responsible for facilitating the transfer of audio and video components over the internet?
RTP, or Real-Time Transport Protocol, Without RTP, you have no VoIP.
324
RTCP, or Real-Time Transport Control Protocol - RTP's sister.
While RTP does the heavy lifting of moving data, RTCP works alongside her to help with quality control.
325
**Which part of the transport protocol works in conjunction with signaling protocols in VoIP communications?** RTP REP RTCP RIP
RTP
326
**What role do transport protocols play in video or voice over IP communications?** They deliver the audio and video data. They eliminate wireless noise. They choose the type of message. They determine device location.
They deliver the audio and video data.
327
**Why is the role of RTCP important in VoIP communications** * It connects the VoIP service to the local area network. * It allows video packets to be sent between multiple devices. * It allows the sender to select what type of message to send. * It allows adjustments to be made to fine-tune transmissions.
It allows adjustments to be made to fine-tune transmissions.
328
**RTCP as a transport protocol doesn't deliver any data. Instead, it focuses on _.** Password acceptance Wi-Fi controls Quality control Logistical transfer
Quality control
329
**If a video call lags or buffers, which part of the transport protocol works to report on that to remedy the situation?** RTCP RTP REP RIP
RTCP