Combo with "MTA 98-366 Networking Fundamentals Lesson 2 Practice Questions" and 1 other
Terms in this set (54)
How many layers are incorporated in the OSI model communications subnetwork?
Answer: C, 3
Which of the following layers deals with the serial transfer of data?
b. Data link
Answer: A, Physical
You need to install a router on your company's network that will allow access to the
Internet. What layer of the OSI does this device reside on?
b. Data link
Answer: C, Network
You run a netstat -an command in the command prompt and notice many connections being
made that say TCP in the left-most column. What layer of the OSI is TCP referring to?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
Answer: D, Layer 4
You suspect a problem with your computer's network adapter and its ability to send the
correct frames of data that correspond with the network architecture used by the rest
of your computers. What layer should you attempt to use as a troubleshooting starting
b. Data link
Answer: B, Data link
A standard such as 100BASE-T refers to which OSI layer?
b. Data link
Answer: A, Physical
Almost all of your users connect to Web sites with Internet Explorer. They usually type
domain names such as www.microsoft.com. What protocol is initiated by default when
they press Enter after typing the domain name?
Answer: C, HTTP
You need to find out the MAC address of your director's computer. He has given you
permission to access his computer. You access the command prompt. What command
should you type to see the computer's MAC address?
d. netstat -an
Answer: B, Ipconfig /all
You need to find out the MAC addresses of all the computers that a particular user's
computer has connected to in the recent past. What command should you use to accomplish
a. ping 127.0.0.1
b. netstat -a
c. arp -a
d. arp -s
Answer: C, arp -a
You have been instructed to capture and analyze packets on a server. What tool will allow
you to do this? (Select the two best answers.)
a. Protocol analyzer
b. Command Prompt
c. netstat -an
Answer: A, Protocal Analyzer and D, Wireshark
The manager of IT asks you ping his laptop to see whether your computer can find it on
the network. In this scenario, the ____________ protocol is being implemented.
A ____________ switch is one that uses logical addressing to determine data paths.
Answer: Layer 3
Ports 1024-49,151 are ports used by vendors for proprietary applications. They are
known as ____________ ports.
Answer: Registered Ports
Port ____________ is used by the File Transfer Protocol.
Your manager wants you to allow HTTP and HTTPS connections to the company
web server. In order to do this, you need to open inbound ports ____________ and
Answer: 80 and 443
Your company hosts a DNS server that resolves domain names to IP addresses. This
server must have ____________ open to service those requests for name resolution.
You need to find out the Internet connections a particular computer has made in the
recent past. You also need to see numeric information so that you know the IP address
and port numbers of the destination computers. You should type the ____________
command in the command prompt.
Answer: netstat -an
The IT director asks you to connect a client computer to an 802.3ab network. This
network uses the ____________ standard.
A user has connected to a Web site. The information that is sent to that user's computer
is encrypted in an encoded format. This change to the data occurs at the ____________
As you delve into a packet of data with your protocol analyzer, you notice that the frame
size is bigger than the packet size. This is because the packet is ____________ inside the
Address Resolution Protocol (ARP)
resolves or translates IP addresses MAC addresses, allowing connectivity between the layer 3 IP system and the layer 2 ethernet system.
Layer 7 - Application layer
This layer is where message creation- and, therefore packet creation- begins. db access is on this level. End-user protocols such as FTP, SMTP, Telnet, and RAS work at this layer.
IP to MAC addressing table
Single channel frequency . official term for "BASE" in 100BASE-T where the "T" stands for Twisted pair. 100 = frequency which is, in this case, 100 MHz.
multiple broadcast channels utilized by the communications system. Examples would be Cable TV or FM radio.
Content Addressable Memory table, stores information about MAC to Port number translations.
the guts of the OSI model transmissions, consisting of layers 1 through 3. Regardless of what type of data transmission occurs in a computer network, the communication sub-network will be employed.
data link layer (DLL)
DLL, establishes, maintains, and decides how transfer is accomplished over the physical layer (median).
When the ip address is enclosed in to the frame.
Presentation layer responsible for coding/ decoding encryption.
Used when another computer wants to connect to a service or application running on your computer. Servers primarily use inbound ports so that they can accept incoming connections and serve data.
Internet Assigned Numbers Authority (IANA)
Port numbering and standards authority.
Internet Control Message Protocol
Displays information about the Ping request. Size of packet, checksum, sequence number...
Internet Engineering Task Force (IETF)
Layers 1 through 4 DLL, Network Layer, Transport Layer, application layer. ensures strong end point connections and conservative transmission of data.
logical addressing for networked devices.
Layer 2 - Data Link Layer
Uses Hexadecimal addressing (MAC) to communicate where the data should be headed. unit of measurement: frames
sends numerous packets to the switch, each of which has a different source MAC address, in an attempt to use up the memory on the switch. If it does, the switch will change state to what is known as failopen mode. The switch will broadcast data on all ports the way a hub does. Killing network bandwidth and allowing the attacker to run a protocol analyzer, in promiscuous mode, to capture data from any other computer on the network.
Media Access Control (MAC) address
DLL networking standard for assigning unique names to devices, specifically Network interface cards.
Layer 3 - network layer
For routing & switching, this layer is for your LAN or WAN with your routers and IP switches. Logical addressing is used at this layer (ip address). Unit of measurement: packets
Open Systems Interconnection (OSI)
reference model is used to define how data communication occurs on computer networks.
These are used when your computer wants to connect to a service or application running on another computer. Client computers primarily use outbound ports, and these are assigned dynamically by the OS.
outside of the ip address packet size inside of the frame, the excess is considered overhead.
Layer 1 - physical layer
If you can touch a network element, it is part o the physical layer. unit of measurement: bits.
Total of 65,536 ports. from 0-65,535. Defined by the IANA (Internet Assigned Numbers Authority)
Layer 6 - presentation layer
this layer translates the data format from sender to receiver in the various OS's that that may be used. Re-directors work on this layer, such as mapped networked drives that enable a computer to access file shares on a remote computer.
Protocol suites such as TCP/IP are referred to as a protocol stack. OSI model shows how a protocol stack, stacks up against the OSI model for transmission of data.
Layer 5 - session layer
Governs the establishment, termination and synchronization of sessions within the OS over the network and between hosts.
Transmission Control Protocol (TCP)
Connection oriented protocol, web browsing, keeps calling for data until it is all complete. Requires end to end logical connection. (CO mode)
Layer 4 - transport layer
Ensures error-free transmission between hosts through logical addressing. Therefore, it manages the transmission of messages through layers 1 to 3. This layer also handles "inbound" and "outbound" ports. Units of measurement: segments
Common protocols include TCP & UDP
User Datagram Protocol (UDP)
connection-less oriented protocol, steaming media, doesn't keep calling for the frames (packets) does not allow for lost packets to be resent (CL mode)
virtual LAN (VLAN)
segments a network, reduces collisions, organize the network, boost performance and hopefully increase security. 802.3Q standard.
Layer 2 Switch
hardware based, use the MAC address of each host computer's network adapter when deciding where to direct frames of data.
Layer 3 Switch
differs from a layer 2 switch in that it determines paths for data using logical addressing (IP addresses) instead of physical addressing (MAC addresses)
(SNMP) Simple Network Management Protocol
Network engineers can manage packets through SNMP