Upgrade to remove ads
Computer Networking Fundementals Final Exam
Guide To Networking Essentials, 6th Edition
Terms in this set (358)
A router is considered to be a CSU/DSU.
T-Carrier lines only require a CSU/DSU on the customer's side of the connection.
Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
Link Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended.
If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
A protocol analyzer, such as Wireshark, gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa.
In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
The ping command is used to determine the path between two devices.
Most SNMP managers allow the configuration of thresholds for generating alert messages to network administrators when those thresholds are exceeded.
Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?
1.54 Mbps is the guaranteed minimum transmission rate.
Select the true statement regarding analog and digital signals.
Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.
When would you most likely NOT choose to use a leased line connection?
when a nondedicated link is needed for backups
Which of the following is something X.25 does NOT offer?
144 Mbps maximum throughput
What is the local loop, or last mile?
the connection between the demarcation point and the CO
You're the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?
reduced physical plant costs
Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
Which of the following protocols is NOT used for Windows 7 VPN connections?
You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies?
You have been asked to install a VPN remote access solution using Windows Server.What do you need to install?
Routing and Remote Access Service (RRAS)
Which one of the following is NOT a typical SONET data rate?
What would an Asynchronous Transfer Mode (ATM) network be best suited for?
carrying voice data and time-sensitive information
Which cloud computing category allows a company to quickly provision additional disk space?
Which cloud computing category refers to the use of software hosted on a service provider's network, and is usually subscription based?
Which statement about Multiprotocol Label Switching (MPLS) is true?
MPLS works with any network layer protocol.
What is the signaling method used to allocate time slots for each channel in a T-carrier line called?
Time Division Multiplexing (TDM)
The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
Basic Rate Interface (BRI
The plain old telephone service is a good example of what kind of WAN technology?
Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies?
T1 uses point to point, while frame relay makes use of virtual circuits.
Part of SONET's flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?
fault tolerant bus
You are currently troubleshooting a network issue with your ISP's customer support agent. The agent requests that you open up command prompt and type "ping 127.0.0.1". What does this accomplish?
tests that the local IP stack is functioning
Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down at a machine and try to ping a well-known website, which fails. You then try to ping a known-public IP address, which succeeds. What is most likely the issue?
DNS settings are incorrect.
You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?
incorrectly configured gateway address
Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?
Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
The last full backup should be restored first, followed by the last successful differential backup prior to the drive failure.
Your current backup schedule involves incremental backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
The full backup must be restored first, followed by all incremental backups in sequential order leading up to the day of failure.
Following a massive infection of your network by a virus, you have been tasked with developing preventive measures for keeping the network infection free. What would be an effective preventive measure?
Install an enterprise-based anti-virus solution.
Which of the following statistics should a network baseline report include
hard drive utilization
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?
Determine what the problem is, and then figure out who has been affected on your network
You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is most likely the problem?
A network switch has not been powered on.
Which of the following is NOT a good practice for performing upgrades?
ignoring updates to new releases
Which statement is true regarding differential / incremental backups?
Incremental backups copy all files changed since the last full or incremental backup and marks files as backed up.
Select the utility inside of Windows that allows the user to recover a previous system state. This utility monitors drives and partitions, as well as registry settings and system files.
When using tape backup, what should be done to ensure that the backups are viable?
Verify data can be restored.
The trial-and-error method should NOT be used under which of the following situations?
The server is your public Web server and is currently hosting all of your business.
Traceroute would be best suited for which of the following tasks?
locating bottlenecks in a network
What does the ping message "Destination host unreachable" message mean?
The pinged IP address is on the same network, but an ARP reply was not received.
What does the ping message "Destination net unreachable" mean?
A router in the path from the source to the destination determined that the destination network does not exist.
What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
A junior network administrator tells you that he can ping a DNS server successfully, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?
________________ is a PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology.
If a portion of a T-Carrier line is used for one purpose and a different portion for another purpose, the line has been ____________.
A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.
The CPE must be able to send data in the correct format onto the connection that makes up the ___________ and receives data coming from that connection.
________ is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.
Most manufacturers store their technical support problems and solutions in a database called a knowledge base or a _______________________ document.
frequently asked questions
To eliminate the potential problems caused by power fluctuations, especially on servers, you can install _________________
uninterruptible power supplies
A ____________ copies selected files to the selected media without marking files as backed up.
The ________ Windows command is used to determine the network path between two devices.
Whether your problem and proposed solution affect an entire network or just a few users, you must devise a ____________ so that you can return things to their original state if the solution doesn't work.
Group accounts make it easier for an administrator to manage user rights and permissions.
In Linux, every user that is created automatically belongs to a default group named Users.
Windows can be installed on an extended partition that has been formatted with the NTFS file system.
An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
A security policy should clearly state the desired rules, even if they cannot be enforced.
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.
A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?
A. User must change password at next logon.
In regards to a user account, what does a white circle with a black arrow indicate?
B. The account is disabled.
You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
In Linux, what is the command for viewing a file's contents onscreen?
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
The partition that contains the Windows OS files is known as the what type of partition?
A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?
If you need to limit the amount of data users can store on a volume, you would implement which of the following?
B. Disk quotas
When a file is encrypted, what color does the file name appear in Windows Explorer?
Which of the following is NOT a Linux file system?
Where are the waiting print jobs stored until they can be sent to the print device?
D. print queue
What tool would you use to view error messages that are generated by system services or applications?
B. Event Viewer
What is RAID level 1 also called?
B. disk mirroring
What level of RAID does not provide fault tolerance?
How many disks are needed to implement a RAID 1 + 0?
Employees in the Sales department need to be able to access the sales share on the file server. They will need to have the ability to create files, read them, and make corrections or additions. Which of the following share permissions should the group be given?
The ultimate goal of network security is to protect which of the following?
D. all of the above
What is a policy that defines the methods involved when a user logs on to the network called?
Which of the following should not be a concern when discerning the level of security that is required in a network?
A. how difficult it would be to enforce a password policy
In Windows 7, what is the maximum length that a password can be?
If the minimum password length on a Windows system is set to zero, what does that mean?
B. The user can use a blank password.
Which one of the following passwords meets Windows password complexity requirement?
Which protocol is used to encrypt data as it travels a network?
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
D. preshared key
When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
B. USB key mode
If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
A. network policy and access services
Which VPN implementation needs no additional configuration to be allowed access through a firewall?
What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?
What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
C. Smurf Attack
Which of the following are case sensitive?
B. Windows password
C. Linux logon name
D. Linux password
Which of the following groups are special identity groups?
B. authenticated users
Which of the following are standard NTFS permissions?
A. List Folder Contents
When dealing with permissions in Linux, what are the three user types that can be assigned permissions?
Which of the following can be used to secure data on disk drives?
Firewall rules can be based on which of the following properties?
A. source IP address
How the network resources are to be used should be clearly defined in a (an) ____________ policy.
In Linux, passwords are stored in an encrypted format in the ____________ file, which is located in the /etc directory.
____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
____________ is a free open-source product that can be used to encrypt the contents of an entire drive.
A ____________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.
When Windows is first installed, two user accounts are created by default. One is the Administrator account, and the other is the ____________ account.
A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user's profile is called a ____________ profile.
The ____________ file system supports a maximum file size of 2GB.
In Windows, the term for a computer that accepts job requests for a shared printer and sends them to the physical device is called a print ____________.
As a network administrator, it is a good idea to have a performance ____________, a collection of performance data from a time when the network is performing normally.
File and printer sharing for Microsoft networks is an example of a network protocol.
A network that has locations in different countries is considered a WAN.
In order to find out your MAC address, you should open a command prompt and type ipconfig /all.
What makes a computer a "server" is the fact that it has a server operating system installed on it.
Each component of a computer is designed to perform only one specific task—either input, processing, or output.
The XYZ company has two offices, one downtown, and a brand new office in the newer section of town. To connect the two offices, they will need a dedicated line, probably leased from the local phone company. What type of network will they be implementing to connect their two offices?
Airwaves are an example of what type of network component?
b. network medium
Windows 7, Windows Vista, and Windows XP are all examples of which of the following?
b. client operating systems
What is one of the disadvantages of a peer-to-peer network compared to a server-based network?
d. limited security
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
b. net view
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
a. additional costs
For any device to communicate with the computer, either through input or output, it must have what special software installed?
d. device driver
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?
c. MAC address
What was the primary reason to create a network?
d. all of the above
You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?
You want a fast CPU for the new computer you are building and your motherboard only has one CPU socket. To increase the processing power, you need a CPU that provides more than one processor. What is this CPU called?
Which component, located on the motherboard, carries out all the instructions provided by computer programs?
You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement?
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
d. NIC driver
You're the network administrator for a company located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing?
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
c. peer-to-peer network
Which of the following are examples of output devices? (Choose all that apply.)
d. hard disk
Which of the following are examples of input devices? (Choose all that apply.)
The three basic functions of a computer are input, ____________, and output.
____________ components include devices such as printers, disk drives, network cards, and monitors.
A ____________ is a packet that has been encapsulated with the source and destination MAC addresses in the header and an error-checking code in the trailer.
There are two different network models. One of them, a peer-to-peer network, also is referred to as a ____________ network.
____________ is an operating system's ability to execute more than one process at a time.
Before data is transmitted, it is broken into chunks of data and then encapsulated with the source and destination IP addresses to create a ____________.
When a NIC is in "promiscuous" mode, it will process only the frames in which the destination MAC address matches its own MAC address.
Routers do not forward broadcast packets.
If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
The function of a repeater is to extend the range of an existing network.
You cannot connect a hub to another hub unless it has an uplink port.
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
Why would you need to use a repeater?
d. You need to add a group of computers to your network, and the distance is too far for normal means of communication.
Which of the following is NOT a function of a hub?
b. transmits the signal to the correct port
How does a switch "learn" MAC addresses?
c. The switch reads each frame and makes a note of where each MAC address came from.
Why is the use of a switch preferred over a hub?
d. All of the above.
What does a switch store in its switching table?
a. the source MAC address of a frame and the port it was received on
What is a packet called that is intended for only one individual computer?
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
What does it usually mean when the activity light on a switch is blinking?
c. It is communicating with the network.
What component of the computer provides it with a MAC address?
A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?
d. It's the organizationally unique identifier for the manufacturer of the device.
What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer?
What is the purpose of the default route?
c. It's where the router sends all packets with destinations of which it has no knowledge.
A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?
When referring to network bandwidth, what is the basic unit of measurement?
b. bits per second
Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP?
The SSID is configured on which of the following so that it can be distinguished from other available wireless networks?
b. access point
What command would you issue from the command prompt to test whether your computer has connectivity to the network?
a. ping IPaddress
Which of the following are features of a router? (Choose all that apply)
b. connects LANs to one another
e. works with packets instead of frames
What type of indicator lights would you find on a hub?
a. network activity
b. link status
The "Locally Administered Address" can be used to override the burned-in __________ address.
In a computer's IP address settings, the _____________ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own.
A __________ frame is a message that is intended to be processed by all devices on the LAN.
The network ____________ is a measurement of the amount of data that can pass through a network in a certain period of time.
A switch operating in ___________ mode can send and receive data at the same time.
A network's physical topology refers to the arrangement of the cabling and how the devices connect to each other.
The physical bus topology is no longer used because it required extra cable to connect all the computers and required a central device.
A point-to-point topology is typically used for WAN connections.
A network's logical topology often depends on the central device's electronics.
A collision can occur on a switch only if the switch is operating in full-duplex mode.
In a physical bus topology, both ends of the medium must be terminated in order to prevent what?
b. signal bounce
Which of the following is NOT an advantage of a physical star?
d. provides redundancy and fault tolerance
Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
c. physical ring
What is the main advantage of a point-to-point topology?
a. data travels on a dedicated link
What type of logical topology is at work when using an Ethernet hub?
a. logical bus
What type of logical topology does a Wireless LAN use?
a. logical bus
In a token ring network, what is the central device called?
d. multistation access unit
What is the most common topology and technology combination in use today?
d. switched / Ethernet
Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling?
c. operates in half-duplex only
What is the Ethernet frame type that is used by TCP/IP?
c. Ethernet II
What does the frame trailer consist of in an Ethernet frame?
d. cyclic redundancy check
What is the media access method used by Ethernet?
What is the best way to eliminate the possibility of collisions in a network?
d. Both a and c
When discussing Ethernet standards, what does the XBaseY terminology refer to?
b. the transmission speed, the type of transmissions, and the length or type of cabling
When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?
c. 100 meters
What is the IEEE standard governing wireless networking?
When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?
b. ad hoc
In wireless networks, what type of media access control is used?
What is the main disadvantage of cable modem networking?
d. It uses a bus topology.
Which of the following is NOT a component of an Ethernet frame header?
d. 4-byte frame check sequence
The way that data travels in a network is referred to as the network's ____________ topology.
In a large network, in which several switches need to be connected together, usually one device is placed at the center, forming a(n) ____________ star.
The most popular LAN technology used today is ____________.
When a wireless computer connects with an AP before it connects with other devices, it is operating in ____________ mode.
A ___________ topology is fully redundant and is the most expensive to implement.
There are two basic categories of physical cabling used in Ethernet networks. They are copper wire and fiber optic.
The length of cable between the wall jack and a patch panel is called vertical cabling.
Wireless and wired networks are both susceptible to RFI.
Because fiber-optic cabling uses light pulses instead of electrical signals, it is immune to interference and highly resistant to eavesdropping.
Wireless networks are often used to extend the reach of a wired LAN.
Which of the following is not one of the main differences between the types of network cabling?
b. the ability to send and receive signals
Which of the following is not a form of electromagnetic interference, or EMI?
When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?
What are all of the connections in a network considered, including the cables and their connectors?
d. cable plant
What is the maximum bandwidth for a network cabled using category 5e UTP cable?
d. 1000 Mbps
What is the maximum cable length for both category 5e and category 6 UTP cable?
c. 100 m
The frequency at which a wireless network operates is measured in cycles per second and is expressed as what unit of measurement?
Terrestrial and satellite systems are two types of which wireless networking technology?
What is the way in which bit signals are represented on the network medium?
Which of the following is a length of cable that connects a computer to either a networking device or to an RJ-45 jack?
d. patch cable
What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?
b. structured cabling
The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?
c. demarcation point
Which of the following connections might require a crossover cable?
c. switch to switch
In an MDI device, on which two pins does the device use to transmit?
a. 1 and 2
What type of wiring should be used for a high-speed connection between two buildings?
d. fiber-optic cabling
What is a disadvantage of using fiber-optic cabling?
d. difficult to install
What type of wireless technology is used for 802.11b /g /n networks?
a. spread-spectrum radio
Which of the following categories of UTP cabling are considered to be data grade as specified by ANSI/TIA/EIA? (Choose all that apply.)
c. Category 4
d. Category 5
e. Category 6
Which of the following are components of a network that are defined by structured cabling?
a. horizontal wiring
c. entrance facility
d. work area
A network that uses the air to transmit signals across the network is considered a(an) ____________ network.
When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out onto other wires.
A type of wireless network that uses light beams to send signals between two devices and is highly susceptible to visible light sources is called ____________.
A wireless ____________ using line-of-sight or broadcast transmissions can extend a wired network over a short distance that would normally require a dedicated communication line from a communications carrier.
Most office buildings usually have a false ceiling with an area above that which is used to run conduit for heating and air conditioning units, called the ____________.
IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
The Internetwork layer is the layer that handles network configuration and is considered the heart of the TCP/IP protocol suite.
The Transport layer uses port numbers to identify the source and destination Application-layer protocol of the data that it contains.
DNS is a protocol that automatically provides a computer with its IP address configuration.
An IP address is composed of 48 bits that are grouped together into 8-bit octets and are represented by a decimal number from 0 to 255.
The Transport layer deals with which unit of information?
Which of the following is not a function of the Network Access layer?
b. delivers packets efficiently
In what layer does the NIC operate?
a. Network Access
In which layer does a router operate?
Which protocol is responsible for determining the MAC address associated with each IP address and keeping a table of its results?
TCP establishes a connection with the destination device using which process?
d. three-way handshake
Which of the following is not an Application layer protocol?
An IP address consists of four octets separated by periods. Which part of this address denotes its class?
a. first octet
How many host addresses are available on a Class C network?
You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address?
What is the binary number system based on?
a. powers of 2
Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID?
b. subnet mask
What is the decimal equivalent to the binary number 11000001?
How many bits are in an IPv6 address?
The last 64 bits of an IPv6 address are the interface identifier. Where is that number derived from?
d. the MAC address
What is the hexadecimal number F equal to in binary?
What is the decimal equivalent to the hexadecimal number D?
How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits?
Which of the following is a feature of TCP? (Choose all that apply.)
a. segments data into chunks
d. ensures flow control
e. establishes a connection
Which of the following are solutions to the shortage of available IPv4 addresses? (Choose all that apply.)
b. private addressing
An IP address is composed of two parts, one is the ____________ ID and one is the host ID.
____________are sets of rules and procedures that dictate communication and behavior.
___________ is a way of breaking a large address space into more, smaller, address spaces.
The four layers of the TCP/IP protocol suite are Application, ____________, Internetwork, and Network Access
An address that can only be used on the internal network and cannot be used to access the Internet is called a ____________ address
The Transport layer is the same in both the OSI model and the TCP/IP model.
The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC sublayer.
The Network layer communicates with the Data Link layer and the Session layer.
The maximum transmission unit for Ethernet is 1518 bytes.
One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP address.
Which layer is responsible for establishing a connection between the source and destination?
Which layer of the OSI model is responsible for encryption and decryption?
Put the layers of the OSI model in order from layer 7 to layer 1.
b. f., a., g., e., b., d., c.
What is a PDU?
c. It is the name given to the unit of information used by each layer.
What information would you find in the header of a Transport layer PDU?
d. window size
At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this process called?
What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?
d. sequence number
What is the IEEE standard that governs all forms of Ethernet media?
Which is the IEEE standard that sets the standards for wireless networking?
Which layer is responsible for determining the best path a packet should travel across an internetwork?
One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called?
c. access control
You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem?
c. Network layer device
Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control sublayer?
b. Data Link
What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand?
At what layer do NICs operate?
b. Data Link
Which layer is responsible for the encoding of signals?
The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?
At which layer would you find errors that were caused by EMI?
How can you find out what your MAC address is? (Choose all that apply.)
a. Right-click on the Local Area Connection and choose status.
c. Open a command prompt and type the command getmac.
d. Open a command prompt and type the command ipconfig /all.
Which of the following are protocols that you find at the Application layer of the OSI model?
The ____________ reference model is a general framework for networking systems that uses a layered approach to reduce its complexity.
The ____________ layer is the bottom layer, whose job it is to convert bits into signals and vice versa.
The process of stripping the header and trailer from a PDU is called ____________.
The PDU at the Data Link layer is called a ____________.
The ____________ layer of the TCP/IP model combines the top three layers of the OSI model into one layer.
Network switches always must be configured before they can be put into operation in a network.
The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
Communications through a router are noticeably faster than communications through a switch.
A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
Which of the following is not a true statement regarding the function of a switch?
a. It determines the path used based on the destination IP address.
Which of the following combinations will you find in a switching table?
d. MAC address/switch port number
Which of the following is the fastest switching mode?
Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called?
Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?
Which of the following is not a function that would be found in a managed switch?
b. the ability to transfer it's switching table with neighboring switches
Each interface on a router must have an IP address and what else to be able to communicate on the network?
c. MAC address
When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?
d. router on a stick
What type of routing protocol are RIP and RIPv2?
d. distance-vector protocol
The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?
When an access control list is applied on a router's interface, that interface is performing a specific function on the packets that it receives. What is that function called?
a. packet filtering
What command issued from a command prompt will display the routing table in Windows?
b. route print
A wireless router is actually composed of three devices, a wireless access point and which two other devices?
c. a router and a switch
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
Which is the strongest form of wireless security?
Which is the PCI bus type that has the highest possible transfer rate?
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?
d. preboot execution environment
On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? (Choose all that apply.)
b. hop count
Which of the following would be found in a routing table on a router?
b. destination network
c. next hop
Access control lists can be configured based on which of the following? (Choose all that apply.)
c. destination network
e. source IP address
When a switch receives a broadcast frame, it ____________ the frame out to all ports.
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
When a disk is formatted, it is impossible to recover the data that was on the disk.
In Windows, you can start the Task Manager by simply right-clicking the taskbar and choosing Start Task Manager.
One critical difference between a client OS and a server OS is the addition of directory services on some server OSs
Virtualization is designed for testing and development purposes only.
Windows Server 2008 R2 can be installed only on a 64-bit system.
Which part of the OS provides users and applications with an interface to manipulate files?
d. file system
What are the chunks called into which the available storage space on a disk drive is broken?
Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task?
What method does the CPU use to divide its computing cycles between more than one process?
c. time slicing
In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?
d. system monitor
What is the native file-sharing protocol in Linux?
Which common e-mail protocol allows the user to access messages, yet still have them stored on the server?
Which of the following is not a function typically provided by the centralized management of a server-based network?
d. protocol analysis
What is the process called that grants or denies a user's access to network resources?
What directory service protocol used in Linux systems is also supported by Windows?
What storage solution involves a third-party company that provides off-site hosting of data?
b. cloud-based storage
What is a partial copy of a VM that is used to restore it to a previous state?
Which of the following virtualization products provides hosted virtualization?
d. VMware Workstation
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation?
Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?
d. Datacenter Edition
Which of the following types of file systems support file and folder permissions? (Choose all that apply.)
A DHCP server can supply the client with more than just its IP address and subnet mask. What other necessary configurations can it supply? (Choose all that apply.)
a. default gateway
d. DNS server
What are the two most common ways of accessing a network resource? (Choose two.)
b. mapping a drive
d. entering a UNC path
Which of the following is a fault tolerant feature provided by a server OS? (Choose all that apply.)
d. server cluster
e. hot-swappable devices
Which of the following virtualization products are used for bare-metal virtualization?
b. Citrix XenServer
d. VMware vSphere
f. Microsoft Hyper-V
A ____________ is a program that runs in the background and provides support for other processes.
In ___________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPU's time.
A ____________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.
When a user enters his username and password to log on to a machine, he is invoking the process of ____________.
A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network ____________.
THIS SET IS OFTEN IN FOLDERS WITH...
Destin Andras Computer Fundementals
KRYSTAL SELF COMPUTER FUNDEMENTALS
Computer Fundemental Vocab
MA131, Chapters 6, 7 and 8
YOU MIGHT ALSO LIKE...
Computer Networking Fundamentals Student Test Bank
CIS 200 Study Guide
OTHER SETS BY THIS CREATOR
IP Addresses Classes and Ranges
Networking Essentials Chapter 1
Net 201 FINAL Review