Network Protocols Overview
304 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of the 'ipconfig' command in Windows?

  • To send packets to external networks
  • To list the contents of a directory
  • To display network configuration details like IP address and subnet mask (correct)
  • To capture network traffic

Which command in Windows is used to list the contents of a directory?

  • Ipconfig
  • CMD
  • Dir (correct)
  • Ping

What is the purpose of a default gateway in networking?

  • To assign IP addresses to devices on the network
  • To display network configuration details
  • To send packets to external networks (correct)
  • To capture network traffic

What is the main function of ARP in TCP/IP?

<p>Map IP addresses to MAC addresses (C)</p> Signup and view all the answers

What does the 'arp -a' command do in networking?

<p>Displays the current contents of the ARP cache (B)</p> Signup and view all the answers

What does Wireshark's Promiscuous Mode do?

<p>Captures all network packets passing through an interface (C)</p> Signup and view all the answers

Which layer of the OSI model is responsible for making a connection with the source destination host while reliably sending packets over the network?

<p>Transport Layer (B)</p> Signup and view all the answers

If a computer attempts to ping a machine not on the local LAN without a default gateway set, what error message is returned?

<p>&quot;Destination host unreachable&quot; (C)</p> Signup and view all the answers

What does TCP maintain during the three phases: connection setup, data transmission, and connection termination?

<p>Reliability and Connection Orientation (B)</p> Signup and view all the answers

What type of message does HTTP use to signify that an image was successfully transferred to the client?

<p>200 (OK) status code (C)</p> Signup and view all the answers

What does the ARP reply send to the device that is sending the ARP request?

<p>Unicast packet (C)</p> Signup and view all the answers

Which PDU is associated with the physical layer of the OSI model?

<p>Bits (B)</p> Signup and view all the answers

What happens to the TTL value when a packet traverses a router?

<p>It decreases (A)</p> Signup and view all the answers

What is the purpose of media converters in networking?

<p>Converting network signals between different interfaces (C)</p> Signup and view all the answers

What are the flags set in each segment of the three-way handshake in TCP communication?

<p>SYN, SYN-ACK, ACK (C)</p> Signup and view all the answers

What is a drawback of the host-based architecture?

<p>Scalability and performance tied to network bandwidth (D)</p> Signup and view all the answers

Which architecture leverages workstation processing?

<p>Client/server architecture (B)</p> Signup and view all the answers

In the Session Layer, which mode of communication allows both ends to communicate simultaneously?

<p>Full duplex (C)</p> Signup and view all the answers

What is a benefit of Peer-to-peer (P2P) architecture?

<p>Provides confidence in data sharing (D)</p> Signup and view all the answers

Which communication protocol is used for sending and receiving email messages?

<p>Simple Mail Transfer Protocol (SMTP) (C)</p> Signup and view all the answers

What is a drawback of the client/server architecture?

<p>Uses excessive network I/O (B)</p> Signup and view all the answers

Which architecture is best suited for a collaborative environment where peers trust each other?

<p>Peer-to-peer (P2P) architecture (A)</p> Signup and view all the answers

What benefit does Cloud computing/N-tier architecture offer in terms of scalability?

<p>Maximizes data and processing distribution (D)</p> Signup and view all the answers

What issue is faced when using Peer-to-peer (P2P) architecture due to the lack of a central authority?

<p>Difficult to provide confidence in data sharing (D)</p> Signup and view all the answers

What type of network topology is characterized by connecting all devices via a single cable running in one direction?

<p>Bus (D)</p> Signup and view all the answers

In a ring topology, if one node fails or bandwidth exceeds its capacity, what happens to the network?

<p>It will fail (B)</p> Signup and view all the answers

Which network topology arranges devices in a web-like structure of interconnected nodes?

<p>Mesh (A)</p> Signup and view all the answers

What is the general rule regarding network ports to enhance security?

<p>Implement a deny-all principle and enable just the ports needed (B)</p> Signup and view all the answers

Which port number is commonly used for HTTPS communication?

<p>Port 443 (D)</p> Signup and view all the answers

Which architecture type involves a large mainframe computer performing all functions with terminals enabling user interactions?

<p>Host-based architecture (D)</p> Signup and view all the answers

What is the consequence of data flooding in a mesh network?

<p>Network congestion and increased traffic (D)</p> Signup and view all the answers

Which port is associated with the Domain Name Service (DNS)?

<p>Port 53 (B)</p> Signup and view all the answers

How does a star network topology handle failure compared to other topologies?

<p>Only central node failure affects the network (A)</p> Signup and view all the answers

'Client/server' architecture distinguishes itself by having which key component?

<p>'User interface' (D)</p> Signup and view all the answers

What is the main purpose of Network Address Translation (NAT)?

<p>To conserve the number of public IP addresses and enhance security (C)</p> Signup and view all the answers

Which sublayer in the OSI model is responsible for controlling access to the physical transmission medium?

<p>Data Link Layer (D)</p> Signup and view all the answers

What protocol is commonly used in Ethernet networks to avoid collisions when multiple devices attempt to transmit simultaneously?

<p>CSMA/CD (Carrier Sense Multiple Access with Collision Detection) (A)</p> Signup and view all the answers

What does the Logical Link Control (LLC) sublayer provide in the OSI model?

<p>Framing and flow control services (B)</p> Signup and view all the answers

What are the 6 components of a structured wire system?

<p>Entrance facilities, equipment room, backbone cabling, telecommunications room, horizontal cabling, work area (A)</p> Signup and view all the answers

Which network topology is characterized by computers connected in a closed circle?

<p>Ring (A)</p> Signup and view all the answers

What type of network connection requires line-of-sight known as the Fresnel Zone?

<p>&quot;Microwave Radio&quot; (D)</p> Signup and view all the answers

Where does a patch panel usually reside in a networking setup?

<p>&quot;Telecommunications Room&quot; (C)</p> Signup and view all the answers

What characteristic distinguishes a local area network (LAN) from a wide area network (WAN)?

<p>&quot;LANs connect devices within a limited physical space while WANs connect devices across larger distances&quot; (B)</p> Signup and view all the answers

"Token Ring" is an example of what kind of protocol?

<p>&quot;MAC Protocol&quot; (C)</p> Signup and view all the answers

What is the main difference between TCP and UDP?

<p>TCP is connection-oriented, while UDP is connectionless (D)</p> Signup and view all the answers

Which protocol is used for error reporting, diagnostics, and exchanging control messages in a network?

<p>ICMP (B)</p> Signup and view all the answers

What is the purpose of a patch panel in a network?

<p>To simplify changes and troubleshooting by organizing connections (B)</p> Signup and view all the answers

In the context of networking devices, what does port density refer to?

<p>The number of physical sockets on a device (C)</p> Signup and view all the answers

What does static routing involve?

<p>Manual configuration and selection of network routes (D)</p> Signup and view all the answers

What is encapsulation in networking?

<p>Adding additional information to data as it travels through OSI or TCP/IP layers (B)</p> Signup and view all the answers

What happens when an Ethernet broadcast frame is received on a LAN?

<p>It is processed by all devices on the LAN except the incoming port (A)</p> Signup and view all the answers

What was ARPANET known for?

<p>The first public packet-switched computer network (D)</p> Signup and view all the answers

What does HTTPS provide that HTTP doesn't, in terms of security?

<p>Encrypted connection (B)</p> Signup and view all the answers

What type of cable is used for direct device-to-device connections?

<p>Crossover cable (A)</p> Signup and view all the answers

What is the main difference between circuit-switched and packet-switched communication?

<p>Circuit-switched establishes a dedicated communication path, while packet-switched breaks data into packets for independent routing. (A)</p> Signup and view all the answers

In terms of network technology, what is the primary function of a router?

<p>Determining the destination network based on IP address. (D)</p> Signup and view all the answers

How does a switch differ from a router in a network environment?

<p>A switch maintains a table of MAC addresses, while a router maintains a routing table for destination networks. (D)</p> Signup and view all the answers

Why is IP-based communication essential for interconnected networks in large geographical areas?

<p>It uses IP addressing to effectively route packets across the network. (C)</p> Signup and view all the answers

What is the key difference between the OSI Model and the TCP/IP Model?

<p>The OSI Model has more layers than the TCP/IP Model. (A)</p> Signup and view all the answers

How do data packets travel from a source to a destination in an IP-based network?

<p>Through intermediary devices like routers and switches for routing. (D)</p> Signup and view all the answers

Which Layer is responsible for 'optionally encrypting' application layer data and ensuring data is presented in a readable format?

<p>Layer 6 (B)</p> Signup and view all the answers

What is the primary function of SOCKS protocol?

<p>To serve as a proxy server for network traffic on PORT 1080 (D)</p> Signup and view all the answers

What distinguishes IPv6 from IPv4?

<p>Address length, notation, headers, and capabilities (B)</p> Signup and view all the answers

Which IEEE standard defines physical layer and MAC sub-layer for wired Ethernet networks?

<p>IEEE 802.3 Standard 10Base-T (B)</p> Signup and view all the answers

What does TLS use to encrypt connections between nodes?

<p>Public-key cryptography (C)</p> Signup and view all the answers

What is the function of L2TP protocol?

<p>To operate at Layer 5 for session management (C)</p> Signup and view all the answers

'Upper layer protocols may need to define and maintain persistent connections' primarily refers to which layer of the OSI model?

<p>Layer 7: Application Layer (D)</p> Signup and view all the answers

'IEEE 802.3 Standard 1000Base-LX' is associated with which type of Ethernet connection medium?

<p>'Single-mode fiber-optic cable' (A)</p> Signup and view all the answers

'Web Browser' was first introduced by whom as part of a new protocol?

<p>'Tim Berners-Lee' (D)</p> Signup and view all the answers

CMD is a command used to change the default gateway in Windows.

<p>False (B)</p> Signup and view all the answers

Wireshark captures all network packets passing through the interface in Stealth Mode.

<p>False (B)</p> Signup and view all the answers

ARP reply opcode is 2.

<p>True (A)</p> Signup and view all the answers

The MAC address is formatted in decimal digits separated by commas.

<p>False (B)</p> Signup and view all the answers

Ping is an ICMP request that echoes the request/reply of the target host.

<p>True (A)</p> Signup and view all the answers

The 'dir' command in Windows lists the contents of a directory.

<p>True (A)</p> Signup and view all the answers

Switches operate at Layer 3 of the OSI model.

<p>False (B)</p> Signup and view all the answers

IP-based communication primarily relies on software tools like TCP and UDP.

<p>True (A)</p> Signup and view all the answers

Packet-switched networks are more susceptible to latency compared to circuit-switched networks.

<p>True (A)</p> Signup and view all the answers

The TCP/IP model has more layers than the OSI model.

<p>False (B)</p> Signup and view all the answers

Routers are responsible for forwarding data packets between devices on the same network.

<p>False (B)</p> Signup and view all the answers

In IP-based networks, data packets are exchanged without any source or destination information.

<p>False (B)</p> Signup and view all the answers

SOCKS protocol is primarily used for email server communication.

<p>False (B)</p> Signup and view all the answers

IPv6 has a shorter address length compared to IPv4.

<p>False (B)</p> Signup and view all the answers

IEEE 802.3 Standard 100Base-TX uses optical fiber as the transmission medium.

<p>False (B)</p> Signup and view all the answers

L2TP operates at Layer 5 of the OSI model.

<p>False (B)</p> Signup and view all the answers

RPC is used to support remote procedure calls between processes on the same computer.

<p>False (B)</p> Signup and view all the answers

Client/server architecture always relies on a mainframe computer to perform all functions.

<p>False (B)</p> Signup and view all the answers

TLS uses symmetric cryptography for encrypting connections between nodes.

<p>False (B)</p> Signup and view all the answers

Cloud computing/N-tier architecture is less complex to code for distributed infrastructure compared to other architectures.

<p>False (B)</p> Signup and view all the answers

IMAP protocol stores emails locally on the client device.

<p>False (B)</p> Signup and view all the answers

Peer-to-peer (P2P) architecture always requires a central authority to manage data sharing.

<p>False (B)</p> Signup and view all the answers

IEEE 802.3 Standard 1000Base-SX uses single-mode fiber for Ethernet connections.

<p>False (B)</p> Signup and view all the answers

The Session Layer allows only simplex communication between applications/computers.

<p>False (B)</p> Signup and view all the answers

H.254 is a call control protocol used in multimedia communication.

<p>False (B)</p> Signup and view all the answers

The Application Layer (Layer 7) does not provide network services directly to end-users through a user interface.

<p>False (B)</p> Signup and view all the answers

TLS ensures data is presented in a readable format at the Transport Layer.

<p>False (B)</p> Signup and view all the answers

DHCP is a protocol used for sending and receiving email messages between message transfer agents.

<p>False (B)</p> Signup and view all the answers

FTP is used to handle streaming media on a network.

<p>False (B)</p> Signup and view all the answers

RTP is primarily used to control multimedia communication using networks.

<p>True (A)</p> Signup and view all the answers

IPSEC protocol is used for encrypting communication on a Virtual Private Network (VPN).

<p>True (A)</p> Signup and view all the answers

The H.254-H.254 protocol is a common session layer communication protocol.

<p>False (B)</p> Signup and view all the answers

In a bus topology, if the central node fails, the entire network will fail.

<p>False (B)</p> Signup and view all the answers

Ring topology allows data to travel in only one direction.

<p>False (B)</p> Signup and view all the answers

Mesh topology ensures that data packets are always transmitted through the most efficient route to reach the destination.

<p>False (B)</p> Signup and view all the answers

Host-based architecture involves the server performing data storage, data access, processing logic, and user interface functions.

<p>True (A)</p> Signup and view all the answers

The TCP Service File Transport Protocol (FTP) data/FTP command uses Port 20/22.

<p>False (B)</p> Signup and view all the answers

UDP Service Simple Network Management Protocol (SNMP) uses Port 160.

<p>False (B)</p> Signup and view all the answers

TCP/UDP Service Lightweight Directory Access Protocol (LDAP) uses Port 389.

<p>True (A)</p> Signup and view all the answers

Transmission Control Protocol (TCP) allows multiple nodes to send data simultaneously in a ring topology.

<p>False (B)</p> Signup and view all the answers

The Logical Link Control (LLC) sublayer in the OSI model is responsible for controlling physical transmission medium access.

<p>False (B)</p> Signup and view all the answers

Mesh topology is not cost-effective for Managed Service Providers because it requires frequent addition of cables to expand the network.

<p>False (B)</p> Signup and view all the answers

A TCP header includes fields for source port, destination port, length, and checksum.

<p>True (A)</p> Signup and view all the answers

The OSI Model consists of the Physical layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, and Application Layer.

<p>True (A)</p> Signup and view all the answers

Media converters are used to connect devices with compatible interfaces.

<p>False (B)</p> Signup and view all the answers

A misconfigured IP address is considered a physical layer issue.

<p>False (B)</p> Signup and view all the answers

The PDU associated with the network layer of the OSI model is a frame.

<p>False (B)</p> Signup and view all the answers

HTTP responses consist of status code, response body, and checksum.

<p>False (B)</p> Signup and view all the answers

ARPANET was known for its development of the Ethernet protocol.

<p>False (B)</p> Signup and view all the answers

The TCP three-way handshake involves SYN, ACK, and FIN flags.

<p>False (B)</p> Signup and view all the answers

If a computer attempts to ping a machine not on the local LAN without a default gateway set, the error message returned will be 'Request timed out.'

<p>False (B)</p> Signup and view all the answers

The first half of a MAC address is known as the Unique Identifier Block (UIB).

<p>False (B)</p> Signup and view all the answers

Network Address Translation (NAT) allows multiple devices inside a private network to share the same public IP address.

<p>True (A)</p> Signup and view all the answers

MAC sublayer uses contention-based access method, where devices need permission to transmit data onto the medium.

<p>False (B)</p> Signup and view all the answers

Logical Link Control (LLC) sublayer provides a consistent way for higher-layer protocols to access different types of network media based on their specific characteristics.

<p>False (B)</p> Signup and view all the answers

Logical Link Control (LLC) sublayer assists in establishing, maintaining, and terminating logical links between nodes over the physical medium.

<p>True (A)</p> Signup and view all the answers

Ethernet is an example of a MAC protocol.

<p>True (A)</p> Signup and view all the answers

The 6 components of a structured wire system include core cabling, distribution frames, and antennae installation.

<p>False (B)</p> Signup and view all the answers

Fiber distributed data interface (FDDI) networking relies on a star topology.

<p>False (B)</p> Signup and view all the answers

Microwave radio connections require line-of-sight and are not affected by the Fresnel Zone.

<p>False (B)</p> Signup and view all the answers

Patch panel is typically not involved in the initial cable connections within a networking closet.

<p>False (B)</p> Signup and view all the answers

A computer network can only be small in scale, such as connecting a single building.

<p>False (B)</p> Signup and view all the answers

Static routing is a dynamic routing technique that adapts to changing network parameters automatically.

<p>False (B)</p> Signup and view all the answers

Encapsulation involves adding extra information to data as it moves through the network layers.

<p>True (A)</p> Signup and view all the answers

An Ethernet broadcast frame is processed only by the device with the matching MAC address.

<p>False (B)</p> Signup and view all the answers

A dynamic port is a fixed port number assigned permanently to a specific communication session.

<p>False (B)</p> Signup and view all the answers

ARPANET was developed by the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) as the first public packet-switched computer network.

<p>True (A)</p> Signup and view all the answers

HTTP was introduced in 1994 as a protocol for secure encrypted connections.

<p>False (B)</p> Signup and view all the answers

Port density refers to the number of logical connections supported by a network device.

<p>False (B)</p> Signup and view all the answers

Crossover cables are used to connect similar devices directly to each other.

<p>True (A)</p> Signup and view all the answers

The TIA/EIA 568A and TIA/EIA 568B standards differ functionally beyond just the position of cable pairs on set pins.

<p>False (B)</p> Signup and view all the answers

A patch panel simplifies network changes and troubleshooting by providing an unstructured interface for cable management.

<p>False (B)</p> Signup and view all the answers

What is the main purpose of the ARP request sent by a device on the network?

<p>To request the MAC address associated with an IP address (D)</p> Signup and view all the answers

Which command is used to display the current contents of the ARP cache in Windows?

<p>arp -a (B)</p> Signup and view all the answers

What is the role of Wireshark's Promiscuous Mode?

<p>Captures all network packets passing through the interface (C)</p> Signup and view all the answers

What information is stored in an ARP cache once resolved?

<p>MAC addresses mapped to IP addresses (C)</p> Signup and view all the answers

In TCP/IP, what does ICMP stand for?

<p>Internet Control Message Protocol (A)</p> Signup and view all the answers

Which Windows command is used to get the command line terminal interface?

<p>cmd (A)</p> Signup and view all the answers

What is the purpose of an IDS (Intrusion Detection System) in a network?

<p>To capture and analyze network traffic for security incidents (D)</p> Signup and view all the answers

In TCP, what are the three main phases that the protocol maintains?

<p>Connection setup, data transmission, connection termination (A)</p> Signup and view all the answers

What is the term used to describe a group of 4 binary bits?

<p>Nibble (D)</p> Signup and view all the answers

What message type is used in HTTP to signify that an image was successfully transferred to the client?

<p>Status code 200 (OK) (D)</p> Signup and view all the answers

When a computer attempts to ping a machine not on the local LAN without a default gateway set, what error message is returned?

<p>&quot;Destination host unreachable&quot; (B)</p> Signup and view all the answers

What is the main function of media converters in networking?

<p>To translate between different types of network technologies (B)</p> Signup and view all the answers

What is the PDU associated with the network layer of the OSI model?

<p>Packet (C)</p> Signup and view all the answers

What is responsible for making a connection with the source destination host while reliably sending packets over the network?

<p>TCP (C)</p> Signup and view all the answers

Which protocol is suitable for real-time applications where speed is crucial but minor data loss is acceptable?

<p>User Datagram Protocol (UDP) (A)</p> Signup and view all the answers

What is the purpose of a patch panel in a network?

<p>Connecting and organizing cables (B)</p> Signup and view all the answers

What does TIA/EIA 568A and TIA/EIA 568B determine in networking?

<p>Order of wires in RJ45 connector (B)</p> Signup and view all the answers

In the OSI model, where does encapsulation involve adding additional information to data?

<p>Physical layer (C)</p> Signup and view all the answers

What is the key characteristic of an Ethernet broadcast frame?

<p>Has a destination MAC address FF-FF-FF-FF-FF-FF (D)</p> Signup and view all the answers

Which network routing technique involves manual configuration and selection of routes?

<p>Static routing (A)</p> Signup and view all the answers

What is the function of a dynamic port in networking?

<p>Allowing multiple simultaneous connections (A)</p> Signup and view all the answers

'Port density' in network devices refers to what aspect?

<h1>of logical connections supported by a device (B)</h1> Signup and view all the answers

'Hertz' is the unit of measurement for what in networking?

<h1>of bits transmitted per second (D)</h1> Signup and view all the answers

'ARPANET' was developed by which entity as the first public packet-switched computer network?

<p>Advanced Research Projects Agency (ARPA) (B)</p> Signup and view all the answers

In IP-based communication, what crucial information do packets contain?

<p>Source and destination information, and data content (C)</p> Signup and view all the answers

What is the primary difference between switches and routers in network technology?

<p>Switches operate on the Data Link layer while routers operate on the Network layer (A)</p> Signup and view all the answers

What is the key role of the Internet Protocol (IP) in an IP-based network?

<p>Routing packets to their destination based on IP addresses (A)</p> Signup and view all the answers

What fundamental difference exists between the OSI Model and the TCP/IP model?

<p>Flexibility in function allocation across layers in TCP/IP model (B)</p> Signup and view all the answers

What is the key distinction between Circuit-Switched and Packet-Switched communication?

<p>Dedicated communication path vs. independent packet routing (C)</p> Signup and view all the answers

How do routers determine the next hop for data packets in a network?

<p>By using destination IP address from the packet header (B)</p> Signup and view all the answers

What is a key drawback of host-based architecture?

<p>Not scalable (D)</p> Signup and view all the answers

In client/server architecture, what type of computer performs all four functions that are accessed by the client computer?

<p>Mainframe computer (B)</p> Signup and view all the answers

What is a significant drawback of client/server architecture in terms of performance?

<p>Tied performance to network bandwidth (B)</p> Signup and view all the answers

What communication protocol is used for controlling multimedia communication using networks?

<p>RTP (B)</p> Signup and view all the answers

Which session layer communication mode allows both ends of communication to communicate simultaneously?

<p>Full Duplex (B)</p> Signup and view all the answers

What is a common benefit of Cloud computing/N-tier architecture?

<p>Scalability and easy component addition (C)</p> Signup and view all the answers

Which layer of the OSI model is responsible for ensuring data is presented in a readable format and optionally encrypts application layer data?

<p>Presentation Layer (B)</p> Signup and view all the answers

Which IEEE 802.3 standard uses copper twisted-pair cabling and allows for connections up to 25 meters long?

<p>IEEE 802.3 Standard 1000Base-CX (A)</p> Signup and view all the answers

What encryption method does Secure Sockets Layer (SSL) use to encrypt connections between nodes?

<p>Asymmetric Encryption (D)</p> Signup and view all the answers

What is the primary purpose of the L2TP protocol?

<p>Facilitating VPN usage (D)</p> Signup and view all the answers

What connection-oriented protocol sets up a connection between the source and destination for message exchange during a conversation?

<p>H.254 (C)</p> Signup and view all the answers

Which of the following represents a difference between IPv4 and IPv6 addressing?

<p>Address Length (B)</p> Signup and view all the answers

What is the primary role of the Transport Layer Security (TLS) protocol?

<p>Encrypting connections between nodes (A)</p> Signup and view all the answers

'Upper layer protocols may need to define and maintain persistent connections.' This statement is most relevant to which layer of the OSI model?

<p>Transport Layer (C)</p> Signup and view all the answers

What is the primary purpose of Network Address Translation (NAT) in a computer network?

<p>To conserve the number of public IP addresses in use (C)</p> Signup and view all the answers

What is the responsibility of the MAC sublayer in a network?

<p>Dealing with issues like addressing and error checking (C)</p> Signup and view all the answers

In a contention-based access method, what happens if multiple devices try to transmit data simultaneously?

<p>Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is used (A)</p> Signup and view all the answers

What service does the Logical Link Control (LLC) sublayer provide in a computer network?

<p>Framing, flow control, and error checking (B)</p> Signup and view all the answers

Which component of a structured wire system is responsible for connecting devices directly in a work environment?

<p>Work area (D)</p> Signup and view all the answers

What is the main function of the Logical Link Control (LLC) sublayer protocol in a computer network?

<p>Providing a common interface for network and MAC layers (B)</p> Signup and view all the answers

What does the MAC address represent in a computer network?

<p>A physical address given by the device manufacturer (D)</p> Signup and view all the answers

What problem does Carrier Sense Multiple Access with Collision Detection (CSMA/CD) help solve in Ethernet networks?

<p>Avoiding collisions that occur when multiple devices transmit simultaneously. (A)</p> Signup and view all the answers

In which network topology can data travel in either direction but must pass through each node until it reaches its destination?

<p>Ring (B)</p> Signup and view all the answers

When a node needs to transmit a data packet to another node in a mesh network, what happens if the most efficient route is unknown?

<p>Data flooding occurs (A)</p> Signup and view all the answers

Which port is associated with the Dynamic Host Configuration Protocol (DHCP)?

<p>Port 67/68 (B)</p> Signup and view all the answers

What is the primary function of a router in a network?

<p>Determining the best path for data packets (D)</p> Signup and view all the answers

What is the main drawback of a bus topology when a cable fails?

<p>The network will die (B)</p> Signup and view all the answers

'Hypertext Transfer Protocol Secure (HTTPS)' is associated with which port?

<p>Port 443 (B)</p> Signup and view all the answers

'NetBIOS session' uses which port for communication?

<p>Port 139 (B)</p> Signup and view all the answers

'Simple Mail Transfer Protocol (SMTP)' utilizes which port?

<p>Port 25 (B)</p> Signup and view all the answers

'Server Message Block (SMB) over IP' operates on which port?

<p>Port 445 (C)</p> Signup and view all the answers

Which layer of the OSI model is most visible because it interacts with software apps?

<p>Application layer (A)</p> Signup and view all the answers

What is the purpose of port numbers in networking?

<p>Tell the server the type of service requested by the client (D)</p> Signup and view all the answers

Which protocol provides secure email via X.509 certificates for authentication?

<p>S/MIME (C)</p> Signup and view all the answers

What is the main function of a service listening on a port in networking?

<p>Providing a specific network service requested by a client (B)</p> Signup and view all the answers

Which networking control uses antimalware programs to check apps for viruses?

<p>Malware Scanners (D)</p> Signup and view all the answers

What does TIA/EIA 568A at one end and TIA/EIA 568B at the other end refer to?

<p>Crossover cable standard (A)</p> Signup and view all the answers

Which backbone network design involves connecting departmental LANs to a centralized high-speed backbone using VLANs and Ethernet tagging?

<p>Flat Backbone Network (C)</p> Signup and view all the answers

In a collapsed backbone network, what layers are merged into a single layer?

<p>Distribution and Core layers (D)</p> Signup and view all the answers

What type of coaxial cable is commonly used for Closed Circuit Television (CCTV) transmission to monitors?

<p>RG-59/U (C)</p> Signup and view all the answers

Which IEEE standard draws up to 15.4 watts of power from the PoE switch port to power certain IP phones?

<p>IEEE 802.3af-2003 (D)</p> Signup and view all the answers

Which method helps identify and prevent collisions in a network, thus improving overall efficiency?

<p>Collision Detection/Avoidance (C)</p> Signup and view all the answers

What key benefit does Quality of Service (QoS) routing provide for real-time applications?

<p>Prioritizing time-sensitive traffic (B)</p> Signup and view all the answers

'Hertz' is a unit of measurement for what in networking?

<p>Frequency (B)</p> Signup and view all the answers

What type of transmission uses square waves and is measured as positive (1) or negative (0) voltage level?

<p>'Digital' transmission (D)</p> Signup and view all the answers

'Reliability' in networking refers to the availability and integrity of what?

<p>'Data transmission' (B)</p> Signup and view all the answers

Which type of malware is designed to disguise itself as a legitimate program to deceive users into downloading it?

<p>Trojan Horse (B)</p> Signup and view all the answers

What transport layer service involves managing the pacing of data to avoid collisions and congestion?

<p>Flow Control (B)</p> Signup and view all the answers

What type of network connection level connects workgroup LANs into department LANs in a hierarchical structure?

<p>Distribution Network (D)</p> Signup and view all the answers

Which IPv6 addressing mode sends packets to the nearest node in a specified group of nodes?

<p>Anycast (A)</p> Signup and view all the answers

What is the primary function of a malware scanner?

<p>Checking files for viruses (D)</p> Signup and view all the answers

Which layer is responsible for the signaling of 1's and 0's in network communication?

<p>Physical Layer (B)</p> Signup and view all the answers

What type of current is used in analog communications like AC appliances?

<p>Alternating Current (AC) (C)</p> Signup and view all the answers

What is the primary difference between circuit-switched and packet-switched networks?

<p>Packet-switched networks break data into packets for transmission, while circuit-switched networks offer dedicated resources. (D)</p> Signup and view all the answers

What does IPv6 provide that IPv4 lacks?

<p>IPv6 offers larger address space, while IPv4 provides more efficient routing. (B)</p> Signup and view all the answers

What is the main function of the Media Access Control (MAC) sublayer in the Data Link Layer?

<p>Physical Addressing (A)</p> Signup and view all the answers

In networking, what is the purpose of a crossover cable?

<p>To directly connect devices with different pin configurations (D)</p> Signup and view all the answers

Which protocol is responsible for ensuring reliable delivery of data packets in the TCP/IP suite?

<p>Transmission Control Protocol (TCP) (C)</p> Signup and view all the answers

What characteristic is essential for high-speed data transmission?

<p>Low Bit Error Rate (A)</p> Signup and view all the answers

What does a patch cable with straight-through configuration enable?

<p>Connection between devices with similar pin configurations (B)</p> Signup and view all the answers

What does the Logical Link Control (LLC) sublayer assist in?

<p>Establishing logical links between nodes over the physical medium (D)</p> Signup and view all the answers

What is the primary function of the data link layer in networking?

<p>Handle network addressing and error detection (A)</p> Signup and view all the answers

In networking, what is the purpose of a static route?

<p>Manually define specific routing paths (A)</p> Signup and view all the answers

What is a possible consequence of a packet needing many hops to reach its destination in networking?

<p>Increased network congestion (C)</p> Signup and view all the answers

What method does a switch use to forward frames with unknown destination MAC addresses in a LAN?

<p>Send the frames to all ports except the source port (C)</p> Signup and view all the answers

What is one characteristic of cut-through switching in networking?

<p>Reduces latency by forwarding frames immediately (D)</p> Signup and view all the answers

How do VLANs improve network efficiency in a physical network?

<p>Segment the network into isolated networks (C)</p> Signup and view all the answers

What issue do Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP) aim to prevent in switching networks?

<p>Network loops (C)</p> Signup and view all the answers

What is a drawback of Layer 2 switches creating flat network topologies?

<p>Increased broadcast frame distribution (C)</p> Signup and view all the answers

What are LAN switches responsible for creating in a network?

<p>MAC address tables. (C)</p> Signup and view all the answers

What is the primary function of a switch in a network?

<p>Make filtering and forwarding decisions based on the destination address (C)</p> Signup and view all the answers

Which network device extends the reach of a network by overcoming attenuation?

<p>Repeater (C)</p> Signup and view all the answers

What is the key feature of a structured wiring system for network infrastructure?

<p>Modular cabling solution for high-speed bandwidth and rapid changes (A)</p> Signup and view all the answers

What is the primary purpose of the ARP broadcast query in a network?

<p>To discover the destination MAC address of a node (B)</p> Signup and view all the answers

Which network technology allows multiple wavelengths of light to travel through a single fiber strand?

<p>Wavelength division multiplexing (B)</p> Signup and view all the answers

In IPv6 networks, what protocol serves a function similar to ARP in IPv4 networks?

<p>Neighbor Discovery Protocol (NDP) (B)</p> Signup and view all the answers

What is the primary purpose of an edge network in a network infrastructure?

<p>Support desktop workstation LAN connections (D)</p> Signup and view all the answers

What does the Layer 3 network device use to make path decisions for IP packet forwarding?

<p>Source/destination IP addresses (D)</p> Signup and view all the answers

Which type of LAN consists of users and devices located in the same part of a building?

<p>Workgroup LAN (D)</p> Signup and view all the answers

What differentiates a metropolitan area backbone from a campus backbone network?

<p>Coverage area (B)</p> Signup and view all the answers

What is characteristic of a collapse backbone network topology?

<p>Multiple access switches connected to high-capacity backbone switches (A)</p> Signup and view all the answers

Which layer of the OSI model is responsible for breaking down data into packets for transmission?

<p>Transport layer (D)</p> Signup and view all the answers

'Inter-building communication' is a key function of which type of network backbone?

<p>'Metropolitan area' Backbone (A)</p> Signup and view all the answers

What is the main function of the Data Link layer in the OSI model?

<p>Ensuring reliable communication within LANs (C)</p> Signup and view all the answers

'Providing high-speed connectivity' is a primary function associated with which type of backbone network?

<p>'Core' Backbone Network (C)</p> Signup and view all the answers

What is the primary purpose of the Packet Switching technique?

<p>Breaking data into smaller packets for efficient transmission (C)</p> Signup and view all the answers

'Supporting PCs and workstations to access network resources' is a key role of which type of network?

<p>'Access' Network (D)</p> Signup and view all the answers

Which layer in the OSI model interacts directly with end users and network programs?

<p>Application Layer (C)</p> Signup and view all the answers

What service does UDP provide that makes it ideal for broadcast or simple messages?

<p>Stateless, connectionless data transmission (B)</p> Signup and view all the answers

Which networking protocol is responsible for defining the seven layers of a communication system?

<p>OSI (A)</p> Signup and view all the answers

What is the purpose of the flow label in IPV6?

<p>Identifying packets belonging to the same flow or stream of data (D)</p> Signup and view all the answers

What does the Traffic field in IPV6 represent?

<p>Packet priority and handling instructions (D)</p> Signup and view all the answers

What is the main function of Address Resolution in networking?

<p>Mapping an IP address to a MAC address (C)</p> Signup and view all the answers

What is the significance of Encapsulation in an IP network?

<p>Adding IP header information to packets (A)</p> Signup and view all the answers

What does Port Address Translation (PAT) achieve in networking?

<p>Mapping multiple private IP addresses to a single public IP address (D)</p> Signup and view all the answers

What does the Time to Live (TTL) value in an IP packet header represent?

<p>Maximum number of network hops before packet discard (D)</p> Signup and view all the answers

'Connectionless protocol' refers primarily to which protocol?

<p>'Internet Control Message Protocol (ICMP)' (B)</p> Signup and view all the answers

'Virtual Circuits' in networking are supported by which layer?

<p>Layer 3 - Network Layer (D)</p> Signup and view all the answers

What is the primary advantage of using a loopback address?

<p>Ensuring proper functioning of the TCP/IP stack. (B)</p> Signup and view all the answers

What does a classful network refer to in address architecture?

<p>Limitation of networks based on specific address classes. (C)</p> Signup and view all the answers

What is the primary role of a NIC in a computer network?

<p>Enabling devices to connect to a network medium (C)</p> Signup and view all the answers

In internetworking at the Data Link Layer, what is the function of a bridge?

<p>Learning MAC addresses for device communication (A)</p> Signup and view all the answers

What is the purpose of a Network Layer address, such as an IP address?

<p>To route data packets through the network (A)</p> Signup and view all the answers

What does a router primarily do in relation to IP packets in a network?

<p>Maintain IP routing tables for path determination (C)</p> Signup and view all the answers

What distinguishes peer-to-peer internetworking from client/server architecture?

<p>Peer-to-peer does not depend on a central server for connections (C)</p> Signup and view all the answers

At the Network Layer, what is the key function of routers?

<p>Building IP routing tables for path determination (A)</p> Signup and view all the answers

What is a key advantage of using different ports for different protocols?

<p>Maintains individual connection separation (C)</p> Signup and view all the answers

Which responsibility is NOT attributed to the transport layer of the TCP/IP model?

<p>Deciding on the route to transmit data (B)</p> Signup and view all the answers

What is one advantage of Cut-Through Switching?

<p>Lower latency (A)</p> Signup and view all the answers

In a structured wiring system, what is the purpose of an Intermediate Distribution Frame (IDF)?

<p>Connectivity to the data center facility (A)</p> Signup and view all the answers

How do switches contribute to making an ethernet network faster?

<p>Isolating traffic between frequently communicating nodes (D)</p> Signup and view all the answers

What must be addressed in the design of an end-to-end solution according to the text?

<p>Edge networks and building backbone networks (D)</p> Signup and view all the answers

Which of the following is a characteristic of Store and Forward Switching?

<p>Higher latency for complete frame verification before forwarding (A)</p> Signup and view all the answers

What role do VLANs play in network communication?

<p>'Isolate network traffic' (C)</p> Signup and view all the answers

'Efficient resource utilization' is a key advantage of which network type?

<p>'Packet-Switched network' (C)</p> Signup and view all the answers

'Campus or building backbone distribution' typically consists of which type of cabling?

<p>'Twisted-pair bundled cabling' (A)</p> Signup and view all the answers

What is the primary function of Wireshark's Promiscuous Mode?

<p>To monitor all network traffic on the same network segment (A)</p> Signup and view all the answers

How does a coaxial transmission medium differ from a glass/fiber transmission medium?

<p>Glass/fiber cables have multiple strands within the same sheath while coaxial cables do not (D)</p> Signup and view all the answers

In TCP/IP Suite, what is the main responsibility of the Application layer protocols?

<p>Passing messages along with destination addresses to lower-layer protocols (A)</p> Signup and view all the answers

How can air impact the transmission of 1's and 0's in a network?

<p>Moisture in the air can cause errors in data transmission (C)</p> Signup and view all the answers

What does the choice between Layer 2 and Layer 3 switches depend on primarily?

<p>Network traffic and real-time application needs (A)</p> Signup and view all the answers

Which component is crucial to consider when designing Ethernet networks for IP phones and powered devices?

<p>Capability for Power over Ethernet (PoE) (B)</p> Signup and view all the answers

What is the primary purpose of incorporating ASIC, dual processors, and LAN switching in switch architecture?

<p>To improve network performance (C)</p> Signup and view all the answers

In networking, what is the main responsibility of the physical layer in the OSI model?

<p>Managing electrical, mechanical, and functional aspects of data transfer (A)</p> Signup and view all the answers

What distinguishes TCP/IP from OSI regarding network communication?

<p>'TCP/IP is a protocol suite for internet communications while OSI offers a network architecture framework' (C)</p> Signup and view all the answers

What happens if two devices on an Ethernet LAN share the same MAC address?

<p>Network errors and collisions occur (D)</p> Signup and view all the answers

Which protocol assists in ensuring transparency for upper layer protocols in the Internet Layer of TCP/IP?

<p>Internet Protocol Security (IPSec) (B)</p> Signup and view all the answers

What is the main responsibility of the network access layer in TCP/IP related to data packets?

<p>Handles packets between nodes of the same LAN (C)</p> Signup and view all the answers

How does IEEE 802.1Q Ethernet tagging contribute to network functionality?

<p>Facilitates VLAN extension across physical switches (B)</p> Signup and view all the answers

What is a significant disadvantage of circuit-switched networks?

<p>Vulnerability to failure (B)</p> Signup and view all the answers

What role does the destination perform in a packet-switched network?

<p>Packet reassembly and order management (C)</p> Signup and view all the answers

How do workgroup LANs handle connectivity needs according to design considerations?

<p>Support various-sized switches for connectivity (B)</p> Signup and view all the answers

Which layer of the TCP/IP model corresponds to the data link and physical layers of the OSI model?

<p>Network Access Layer (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser