Network Protocols Overview
304 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of the 'ipconfig' command in Windows?

  • To send packets to external networks
  • To list the contents of a directory
  • To display network configuration details like IP address and subnet mask (correct)
  • To capture network traffic
  • Which command in Windows is used to list the contents of a directory?

  • Ipconfig
  • CMD
  • Dir (correct)
  • Ping
  • What is the purpose of a default gateway in networking?

  • To assign IP addresses to devices on the network
  • To display network configuration details
  • To send packets to external networks (correct)
  • To capture network traffic
  • What is the main function of ARP in TCP/IP?

    <p>Map IP addresses to MAC addresses</p> Signup and view all the answers

    What does the 'arp -a' command do in networking?

    <p>Displays the current contents of the ARP cache</p> Signup and view all the answers

    What does Wireshark's Promiscuous Mode do?

    <p>Captures all network packets passing through an interface</p> Signup and view all the answers

    Which layer of the OSI model is responsible for making a connection with the source destination host while reliably sending packets over the network?

    <p>Transport Layer</p> Signup and view all the answers

    If a computer attempts to ping a machine not on the local LAN without a default gateway set, what error message is returned?

    <p>&quot;Destination host unreachable&quot;</p> Signup and view all the answers

    What does TCP maintain during the three phases: connection setup, data transmission, and connection termination?

    <p>Reliability and Connection Orientation</p> Signup and view all the answers

    What type of message does HTTP use to signify that an image was successfully transferred to the client?

    <p>200 (OK) status code</p> Signup and view all the answers

    What does the ARP reply send to the device that is sending the ARP request?

    <p>Unicast packet</p> Signup and view all the answers

    Which PDU is associated with the physical layer of the OSI model?

    <p>Bits</p> Signup and view all the answers

    What happens to the TTL value when a packet traverses a router?

    <p>It decreases</p> Signup and view all the answers

    What is the purpose of media converters in networking?

    <p>Converting network signals between different interfaces</p> Signup and view all the answers

    What are the flags set in each segment of the three-way handshake in TCP communication?

    <p>SYN, SYN-ACK, ACK</p> Signup and view all the answers

    What is a drawback of the host-based architecture?

    <p>Scalability and performance tied to network bandwidth</p> Signup and view all the answers

    Which architecture leverages workstation processing?

    <p>Client/server architecture</p> Signup and view all the answers

    In the Session Layer, which mode of communication allows both ends to communicate simultaneously?

    <p>Full duplex</p> Signup and view all the answers

    What is a benefit of Peer-to-peer (P2P) architecture?

    <p>Provides confidence in data sharing</p> Signup and view all the answers

    Which communication protocol is used for sending and receiving email messages?

    <p>Simple Mail Transfer Protocol (SMTP)</p> Signup and view all the answers

    What is a drawback of the client/server architecture?

    <p>Uses excessive network I/O</p> Signup and view all the answers

    Which architecture is best suited for a collaborative environment where peers trust each other?

    <p>Peer-to-peer (P2P) architecture</p> Signup and view all the answers

    What benefit does Cloud computing/N-tier architecture offer in terms of scalability?

    <p>Maximizes data and processing distribution</p> Signup and view all the answers

    What issue is faced when using Peer-to-peer (P2P) architecture due to the lack of a central authority?

    <p>Difficult to provide confidence in data sharing</p> Signup and view all the answers

    What type of network topology is characterized by connecting all devices via a single cable running in one direction?

    <p>Bus</p> Signup and view all the answers

    In a ring topology, if one node fails or bandwidth exceeds its capacity, what happens to the network?

    <p>It will fail</p> Signup and view all the answers

    Which network topology arranges devices in a web-like structure of interconnected nodes?

    <p>Mesh</p> Signup and view all the answers

    What is the general rule regarding network ports to enhance security?

    <p>Implement a deny-all principle and enable just the ports needed</p> Signup and view all the answers

    Which port number is commonly used for HTTPS communication?

    <p>Port 443</p> Signup and view all the answers

    Which architecture type involves a large mainframe computer performing all functions with terminals enabling user interactions?

    <p>Host-based architecture</p> Signup and view all the answers

    What is the consequence of data flooding in a mesh network?

    <p>Network congestion and increased traffic</p> Signup and view all the answers

    Which port is associated with the Domain Name Service (DNS)?

    <p>Port 53</p> Signup and view all the answers

    How does a star network topology handle failure compared to other topologies?

    <p>Only central node failure affects the network</p> Signup and view all the answers

    'Client/server' architecture distinguishes itself by having which key component?

    <p>'User interface'</p> Signup and view all the answers

    What is the main purpose of Network Address Translation (NAT)?

    <p>To conserve the number of public IP addresses and enhance security</p> Signup and view all the answers

    Which sublayer in the OSI model is responsible for controlling access to the physical transmission medium?

    <p>Data Link Layer</p> Signup and view all the answers

    What protocol is commonly used in Ethernet networks to avoid collisions when multiple devices attempt to transmit simultaneously?

    <p>CSMA/CD (Carrier Sense Multiple Access with Collision Detection)</p> Signup and view all the answers

    What does the Logical Link Control (LLC) sublayer provide in the OSI model?

    <p>Framing and flow control services</p> Signup and view all the answers

    What are the 6 components of a structured wire system?

    <p>Entrance facilities, equipment room, backbone cabling, telecommunications room, horizontal cabling, work area</p> Signup and view all the answers

    Which network topology is characterized by computers connected in a closed circle?

    <p>Ring</p> Signup and view all the answers

    What type of network connection requires line-of-sight known as the Fresnel Zone?

    <p>&quot;Microwave Radio&quot;</p> Signup and view all the answers

    Where does a patch panel usually reside in a networking setup?

    <p>&quot;Telecommunications Room&quot;</p> Signup and view all the answers

    What characteristic distinguishes a local area network (LAN) from a wide area network (WAN)?

    <p>&quot;LANs connect devices within a limited physical space while WANs connect devices across larger distances&quot;</p> Signup and view all the answers

    "Token Ring" is an example of what kind of protocol?

    <p>&quot;MAC Protocol&quot;</p> Signup and view all the answers

    What is the main difference between TCP and UDP?

    <p>TCP is connection-oriented, while UDP is connectionless</p> Signup and view all the answers

    Which protocol is used for error reporting, diagnostics, and exchanging control messages in a network?

    <p>ICMP</p> Signup and view all the answers

    What is the purpose of a patch panel in a network?

    <p>To simplify changes and troubleshooting by organizing connections</p> Signup and view all the answers

    In the context of networking devices, what does port density refer to?

    <p>The number of physical sockets on a device</p> Signup and view all the answers

    What does static routing involve?

    <p>Manual configuration and selection of network routes</p> Signup and view all the answers

    What is encapsulation in networking?

    <p>Adding additional information to data as it travels through OSI or TCP/IP layers</p> Signup and view all the answers

    What happens when an Ethernet broadcast frame is received on a LAN?

    <p>It is processed by all devices on the LAN except the incoming port</p> Signup and view all the answers

    What was ARPANET known for?

    <p>The first public packet-switched computer network</p> Signup and view all the answers

    What does HTTPS provide that HTTP doesn't, in terms of security?

    <p>Encrypted connection</p> Signup and view all the answers

    What type of cable is used for direct device-to-device connections?

    <p>Crossover cable</p> Signup and view all the answers

    What is the main difference between circuit-switched and packet-switched communication?

    <p>Circuit-switched establishes a dedicated communication path, while packet-switched breaks data into packets for independent routing.</p> Signup and view all the answers

    In terms of network technology, what is the primary function of a router?

    <p>Determining the destination network based on IP address.</p> Signup and view all the answers

    How does a switch differ from a router in a network environment?

    <p>A switch maintains a table of MAC addresses, while a router maintains a routing table for destination networks.</p> Signup and view all the answers

    Why is IP-based communication essential for interconnected networks in large geographical areas?

    <p>It uses IP addressing to effectively route packets across the network.</p> Signup and view all the answers

    What is the key difference between the OSI Model and the TCP/IP Model?

    <p>The OSI Model has more layers than the TCP/IP Model.</p> Signup and view all the answers

    How do data packets travel from a source to a destination in an IP-based network?

    <p>Through intermediary devices like routers and switches for routing.</p> Signup and view all the answers

    Which Layer is responsible for 'optionally encrypting' application layer data and ensuring data is presented in a readable format?

    <p>Layer 6</p> Signup and view all the answers

    What is the primary function of SOCKS protocol?

    <p>To serve as a proxy server for network traffic on PORT 1080</p> Signup and view all the answers

    What distinguishes IPv6 from IPv4?

    <p>Address length, notation, headers, and capabilities</p> Signup and view all the answers

    Which IEEE standard defines physical layer and MAC sub-layer for wired Ethernet networks?

    <p>IEEE 802.3 Standard 10Base-T</p> Signup and view all the answers

    What does TLS use to encrypt connections between nodes?

    <p>Public-key cryptography</p> Signup and view all the answers

    What is the function of L2TP protocol?

    <p>To operate at Layer 5 for session management</p> Signup and view all the answers

    'Upper layer protocols may need to define and maintain persistent connections' primarily refers to which layer of the OSI model?

    <p>Layer 7: Application Layer</p> Signup and view all the answers

    'IEEE 802.3 Standard 1000Base-LX' is associated with which type of Ethernet connection medium?

    <p>'Single-mode fiber-optic cable'</p> Signup and view all the answers

    'Web Browser' was first introduced by whom as part of a new protocol?

    <p>'Tim Berners-Lee'</p> Signup and view all the answers

    CMD is a command used to change the default gateway in Windows.

    <p>False</p> Signup and view all the answers

    Wireshark captures all network packets passing through the interface in Stealth Mode.

    <p>False</p> Signup and view all the answers

    ARP reply opcode is 2.

    <p>True</p> Signup and view all the answers

    The MAC address is formatted in decimal digits separated by commas.

    <p>False</p> Signup and view all the answers

    Ping is an ICMP request that echoes the request/reply of the target host.

    <p>True</p> Signup and view all the answers

    The 'dir' command in Windows lists the contents of a directory.

    <p>True</p> Signup and view all the answers

    Switches operate at Layer 3 of the OSI model.

    <p>False</p> Signup and view all the answers

    IP-based communication primarily relies on software tools like TCP and UDP.

    <p>True</p> Signup and view all the answers

    Packet-switched networks are more susceptible to latency compared to circuit-switched networks.

    <p>True</p> Signup and view all the answers

    The TCP/IP model has more layers than the OSI model.

    <p>False</p> Signup and view all the answers

    Routers are responsible for forwarding data packets between devices on the same network.

    <p>False</p> Signup and view all the answers

    In IP-based networks, data packets are exchanged without any source or destination information.

    <p>False</p> Signup and view all the answers

    SOCKS protocol is primarily used for email server communication.

    <p>False</p> Signup and view all the answers

    IPv6 has a shorter address length compared to IPv4.

    <p>False</p> Signup and view all the answers

    IEEE 802.3 Standard 100Base-TX uses optical fiber as the transmission medium.

    <p>False</p> Signup and view all the answers

    L2TP operates at Layer 5 of the OSI model.

    <p>False</p> Signup and view all the answers

    RPC is used to support remote procedure calls between processes on the same computer.

    <p>False</p> Signup and view all the answers

    Client/server architecture always relies on a mainframe computer to perform all functions.

    <p>False</p> Signup and view all the answers

    TLS uses symmetric cryptography for encrypting connections between nodes.

    <p>False</p> Signup and view all the answers

    Cloud computing/N-tier architecture is less complex to code for distributed infrastructure compared to other architectures.

    <p>False</p> Signup and view all the answers

    IMAP protocol stores emails locally on the client device.

    <p>False</p> Signup and view all the answers

    Peer-to-peer (P2P) architecture always requires a central authority to manage data sharing.

    <p>False</p> Signup and view all the answers

    IEEE 802.3 Standard 1000Base-SX uses single-mode fiber for Ethernet connections.

    <p>False</p> Signup and view all the answers

    The Session Layer allows only simplex communication between applications/computers.

    <p>False</p> Signup and view all the answers

    H.254 is a call control protocol used in multimedia communication.

    <p>False</p> Signup and view all the answers

    The Application Layer (Layer 7) does not provide network services directly to end-users through a user interface.

    <p>False</p> Signup and view all the answers

    TLS ensures data is presented in a readable format at the Transport Layer.

    <p>False</p> Signup and view all the answers

    DHCP is a protocol used for sending and receiving email messages between message transfer agents.

    <p>False</p> Signup and view all the answers

    FTP is used to handle streaming media on a network.

    <p>False</p> Signup and view all the answers

    RTP is primarily used to control multimedia communication using networks.

    <p>True</p> Signup and view all the answers

    IPSEC protocol is used for encrypting communication on a Virtual Private Network (VPN).

    <p>True</p> Signup and view all the answers

    The H.254-H.254 protocol is a common session layer communication protocol.

    <p>False</p> Signup and view all the answers

    In a bus topology, if the central node fails, the entire network will fail.

    <p>False</p> Signup and view all the answers

    Ring topology allows data to travel in only one direction.

    <p>False</p> Signup and view all the answers

    Mesh topology ensures that data packets are always transmitted through the most efficient route to reach the destination.

    <p>False</p> Signup and view all the answers

    Host-based architecture involves the server performing data storage, data access, processing logic, and user interface functions.

    <p>True</p> Signup and view all the answers

    The TCP Service File Transport Protocol (FTP) data/FTP command uses Port 20/22.

    <p>False</p> Signup and view all the answers

    UDP Service Simple Network Management Protocol (SNMP) uses Port 160.

    <p>False</p> Signup and view all the answers

    TCP/UDP Service Lightweight Directory Access Protocol (LDAP) uses Port 389.

    <p>True</p> Signup and view all the answers

    Transmission Control Protocol (TCP) allows multiple nodes to send data simultaneously in a ring topology.

    <p>False</p> Signup and view all the answers

    The Logical Link Control (LLC) sublayer in the OSI model is responsible for controlling physical transmission medium access.

    <p>False</p> Signup and view all the answers

    Mesh topology is not cost-effective for Managed Service Providers because it requires frequent addition of cables to expand the network.

    <p>False</p> Signup and view all the answers

    A TCP header includes fields for source port, destination port, length, and checksum.

    <p>True</p> Signup and view all the answers

    The OSI Model consists of the Physical layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, and Application Layer.

    <p>True</p> Signup and view all the answers

    Media converters are used to connect devices with compatible interfaces.

    <p>False</p> Signup and view all the answers

    A misconfigured IP address is considered a physical layer issue.

    <p>False</p> Signup and view all the answers

    The PDU associated with the network layer of the OSI model is a frame.

    <p>False</p> Signup and view all the answers

    HTTP responses consist of status code, response body, and checksum.

    <p>False</p> Signup and view all the answers

    ARPANET was known for its development of the Ethernet protocol.

    <p>False</p> Signup and view all the answers

    The TCP three-way handshake involves SYN, ACK, and FIN flags.

    <p>False</p> Signup and view all the answers

    If a computer attempts to ping a machine not on the local LAN without a default gateway set, the error message returned will be 'Request timed out.'

    <p>False</p> Signup and view all the answers

    The first half of a MAC address is known as the Unique Identifier Block (UIB).

    <p>False</p> Signup and view all the answers

    Network Address Translation (NAT) allows multiple devices inside a private network to share the same public IP address.

    <p>True</p> Signup and view all the answers

    MAC sublayer uses contention-based access method, where devices need permission to transmit data onto the medium.

    <p>False</p> Signup and view all the answers

    Logical Link Control (LLC) sublayer provides a consistent way for higher-layer protocols to access different types of network media based on their specific characteristics.

    <p>False</p> Signup and view all the answers

    Logical Link Control (LLC) sublayer assists in establishing, maintaining, and terminating logical links between nodes over the physical medium.

    <p>True</p> Signup and view all the answers

    Ethernet is an example of a MAC protocol.

    <p>True</p> Signup and view all the answers

    The 6 components of a structured wire system include core cabling, distribution frames, and antennae installation.

    <p>False</p> Signup and view all the answers

    Fiber distributed data interface (FDDI) networking relies on a star topology.

    <p>False</p> Signup and view all the answers

    Microwave radio connections require line-of-sight and are not affected by the Fresnel Zone.

    <p>False</p> Signup and view all the answers

    Patch panel is typically not involved in the initial cable connections within a networking closet.

    <p>False</p> Signup and view all the answers

    A computer network can only be small in scale, such as connecting a single building.

    <p>False</p> Signup and view all the answers

    Static routing is a dynamic routing technique that adapts to changing network parameters automatically.

    <p>False</p> Signup and view all the answers

    Encapsulation involves adding extra information to data as it moves through the network layers.

    <p>True</p> Signup and view all the answers

    An Ethernet broadcast frame is processed only by the device with the matching MAC address.

    <p>False</p> Signup and view all the answers

    A dynamic port is a fixed port number assigned permanently to a specific communication session.

    <p>False</p> Signup and view all the answers

    ARPANET was developed by the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) as the first public packet-switched computer network.

    <p>True</p> Signup and view all the answers

    HTTP was introduced in 1994 as a protocol for secure encrypted connections.

    <p>False</p> Signup and view all the answers

    Port density refers to the number of logical connections supported by a network device.

    <p>False</p> Signup and view all the answers

    Crossover cables are used to connect similar devices directly to each other.

    <p>True</p> Signup and view all the answers

    The TIA/EIA 568A and TIA/EIA 568B standards differ functionally beyond just the position of cable pairs on set pins.

    <p>False</p> Signup and view all the answers

    A patch panel simplifies network changes and troubleshooting by providing an unstructured interface for cable management.

    <p>False</p> Signup and view all the answers

    What is the main purpose of the ARP request sent by a device on the network?

    <p>To request the MAC address associated with an IP address</p> Signup and view all the answers

    Which command is used to display the current contents of the ARP cache in Windows?

    <p>arp -a</p> Signup and view all the answers

    What is the role of Wireshark's Promiscuous Mode?

    <p>Captures all network packets passing through the interface</p> Signup and view all the answers

    What information is stored in an ARP cache once resolved?

    <p>MAC addresses mapped to IP addresses</p> Signup and view all the answers

    In TCP/IP, what does ICMP stand for?

    <p>Internet Control Message Protocol</p> Signup and view all the answers

    Which Windows command is used to get the command line terminal interface?

    <p>cmd</p> Signup and view all the answers

    What is the purpose of an IDS (Intrusion Detection System) in a network?

    <p>To capture and analyze network traffic for security incidents</p> Signup and view all the answers

    In TCP, what are the three main phases that the protocol maintains?

    <p>Connection setup, data transmission, connection termination</p> Signup and view all the answers

    What is the term used to describe a group of 4 binary bits?

    <p>Nibble</p> Signup and view all the answers

    What message type is used in HTTP to signify that an image was successfully transferred to the client?

    <p>Status code 200 (OK)</p> Signup and view all the answers

    When a computer attempts to ping a machine not on the local LAN without a default gateway set, what error message is returned?

    <p>&quot;Destination host unreachable&quot;</p> Signup and view all the answers

    What is the main function of media converters in networking?

    <p>To translate between different types of network technologies</p> Signup and view all the answers

    What is the PDU associated with the network layer of the OSI model?

    <p>Packet</p> Signup and view all the answers

    What is responsible for making a connection with the source destination host while reliably sending packets over the network?

    <p>TCP</p> Signup and view all the answers

    Which protocol is suitable for real-time applications where speed is crucial but minor data loss is acceptable?

    <p>User Datagram Protocol (UDP)</p> Signup and view all the answers

    What is the purpose of a patch panel in a network?

    <p>Connecting and organizing cables</p> Signup and view all the answers

    What does TIA/EIA 568A and TIA/EIA 568B determine in networking?

    <p>Order of wires in RJ45 connector</p> Signup and view all the answers

    In the OSI model, where does encapsulation involve adding additional information to data?

    <p>Physical layer</p> Signup and view all the answers

    What is the key characteristic of an Ethernet broadcast frame?

    <p>Has a destination MAC address FF-FF-FF-FF-FF-FF</p> Signup and view all the answers

    Which network routing technique involves manual configuration and selection of routes?

    <p>Static routing</p> Signup and view all the answers

    What is the function of a dynamic port in networking?

    <p>Allowing multiple simultaneous connections</p> Signup and view all the answers

    'Port density' in network devices refers to what aspect?

    <h1>of logical connections supported by a device</h1> Signup and view all the answers

    'Hertz' is the unit of measurement for what in networking?

    <h1>of bits transmitted per second</h1> Signup and view all the answers

    'ARPANET' was developed by which entity as the first public packet-switched computer network?

    <p>Advanced Research Projects Agency (ARPA)</p> Signup and view all the answers

    In IP-based communication, what crucial information do packets contain?

    <p>Source and destination information, and data content</p> Signup and view all the answers

    What is the primary difference between switches and routers in network technology?

    <p>Switches operate on the Data Link layer while routers operate on the Network layer</p> Signup and view all the answers

    What is the key role of the Internet Protocol (IP) in an IP-based network?

    <p>Routing packets to their destination based on IP addresses</p> Signup and view all the answers

    What fundamental difference exists between the OSI Model and the TCP/IP model?

    <p>Flexibility in function allocation across layers in TCP/IP model</p> Signup and view all the answers

    What is the key distinction between Circuit-Switched and Packet-Switched communication?

    <p>Dedicated communication path vs. independent packet routing</p> Signup and view all the answers

    How do routers determine the next hop for data packets in a network?

    <p>By using destination IP address from the packet header</p> Signup and view all the answers

    What is a key drawback of host-based architecture?

    <p>Not scalable</p> Signup and view all the answers

    In client/server architecture, what type of computer performs all four functions that are accessed by the client computer?

    <p>Mainframe computer</p> Signup and view all the answers

    What is a significant drawback of client/server architecture in terms of performance?

    <p>Tied performance to network bandwidth</p> Signup and view all the answers

    What communication protocol is used for controlling multimedia communication using networks?

    <p>RTP</p> Signup and view all the answers

    Which session layer communication mode allows both ends of communication to communicate simultaneously?

    <p>Full Duplex</p> Signup and view all the answers

    What is a common benefit of Cloud computing/N-tier architecture?

    <p>Scalability and easy component addition</p> Signup and view all the answers

    Which layer of the OSI model is responsible for ensuring data is presented in a readable format and optionally encrypts application layer data?

    <p>Presentation Layer</p> Signup and view all the answers

    Which IEEE 802.3 standard uses copper twisted-pair cabling and allows for connections up to 25 meters long?

    <p>IEEE 802.3 Standard 1000Base-CX</p> Signup and view all the answers

    What encryption method does Secure Sockets Layer (SSL) use to encrypt connections between nodes?

    <p>Asymmetric Encryption</p> Signup and view all the answers

    What is the primary purpose of the L2TP protocol?

    <p>Facilitating VPN usage</p> Signup and view all the answers

    What connection-oriented protocol sets up a connection between the source and destination for message exchange during a conversation?

    <p>H.254</p> Signup and view all the answers

    Which of the following represents a difference between IPv4 and IPv6 addressing?

    <p>Address Length</p> Signup and view all the answers

    What is the primary role of the Transport Layer Security (TLS) protocol?

    <p>Encrypting connections between nodes</p> Signup and view all the answers

    'Upper layer protocols may need to define and maintain persistent connections.' This statement is most relevant to which layer of the OSI model?

    <p>Transport Layer</p> Signup and view all the answers

    What is the primary purpose of Network Address Translation (NAT) in a computer network?

    <p>To conserve the number of public IP addresses in use</p> Signup and view all the answers

    What is the responsibility of the MAC sublayer in a network?

    <p>Dealing with issues like addressing and error checking</p> Signup and view all the answers

    In a contention-based access method, what happens if multiple devices try to transmit data simultaneously?

    <p>Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is used</p> Signup and view all the answers

    What service does the Logical Link Control (LLC) sublayer provide in a computer network?

    <p>Framing, flow control, and error checking</p> Signup and view all the answers

    Which component of a structured wire system is responsible for connecting devices directly in a work environment?

    <p>Work area</p> Signup and view all the answers

    What is the main function of the Logical Link Control (LLC) sublayer protocol in a computer network?

    <p>Providing a common interface for network and MAC layers</p> Signup and view all the answers

    What does the MAC address represent in a computer network?

    <p>A physical address given by the device manufacturer</p> Signup and view all the answers

    What problem does Carrier Sense Multiple Access with Collision Detection (CSMA/CD) help solve in Ethernet networks?

    <p>Avoiding collisions that occur when multiple devices transmit simultaneously.</p> Signup and view all the answers

    In which network topology can data travel in either direction but must pass through each node until it reaches its destination?

    <p>Ring</p> Signup and view all the answers

    When a node needs to transmit a data packet to another node in a mesh network, what happens if the most efficient route is unknown?

    <p>Data flooding occurs</p> Signup and view all the answers

    Which port is associated with the Dynamic Host Configuration Protocol (DHCP)?

    <p>Port 67/68</p> Signup and view all the answers

    What is the primary function of a router in a network?

    <p>Determining the best path for data packets</p> Signup and view all the answers

    What is the main drawback of a bus topology when a cable fails?

    <p>The network will die</p> Signup and view all the answers

    'Hypertext Transfer Protocol Secure (HTTPS)' is associated with which port?

    <p>Port 443</p> Signup and view all the answers

    'NetBIOS session' uses which port for communication?

    <p>Port 139</p> Signup and view all the answers

    'Simple Mail Transfer Protocol (SMTP)' utilizes which port?

    <p>Port 25</p> Signup and view all the answers

    'Server Message Block (SMB) over IP' operates on which port?

    <p>Port 445</p> Signup and view all the answers

    Which layer of the OSI model is most visible because it interacts with software apps?

    <p>Application layer</p> Signup and view all the answers

    What is the purpose of port numbers in networking?

    <p>Tell the server the type of service requested by the client</p> Signup and view all the answers

    Which protocol provides secure email via X.509 certificates for authentication?

    <p>S/MIME</p> Signup and view all the answers

    What is the main function of a service listening on a port in networking?

    <p>Providing a specific network service requested by a client</p> Signup and view all the answers

    Which networking control uses antimalware programs to check apps for viruses?

    <p>Malware Scanners</p> Signup and view all the answers

    What does TIA/EIA 568A at one end and TIA/EIA 568B at the other end refer to?

    <p>Crossover cable standard</p> Signup and view all the answers

    Which backbone network design involves connecting departmental LANs to a centralized high-speed backbone using VLANs and Ethernet tagging?

    <p>Flat Backbone Network</p> Signup and view all the answers

    In a collapsed backbone network, what layers are merged into a single layer?

    <p>Distribution and Core layers</p> Signup and view all the answers

    What type of coaxial cable is commonly used for Closed Circuit Television (CCTV) transmission to monitors?

    <p>RG-59/U</p> Signup and view all the answers

    Which IEEE standard draws up to 15.4 watts of power from the PoE switch port to power certain IP phones?

    <p>IEEE 802.3af-2003</p> Signup and view all the answers

    Which method helps identify and prevent collisions in a network, thus improving overall efficiency?

    <p>Collision Detection/Avoidance</p> Signup and view all the answers

    What key benefit does Quality of Service (QoS) routing provide for real-time applications?

    <p>Prioritizing time-sensitive traffic</p> Signup and view all the answers

    'Hertz' is a unit of measurement for what in networking?

    <p>Frequency</p> Signup and view all the answers

    What type of transmission uses square waves and is measured as positive (1) or negative (0) voltage level?

    <p>'Digital' transmission</p> Signup and view all the answers

    'Reliability' in networking refers to the availability and integrity of what?

    <p>'Data transmission'</p> Signup and view all the answers

    Which type of malware is designed to disguise itself as a legitimate program to deceive users into downloading it?

    <p>Trojan Horse</p> Signup and view all the answers

    What transport layer service involves managing the pacing of data to avoid collisions and congestion?

    <p>Flow Control</p> Signup and view all the answers

    What type of network connection level connects workgroup LANs into department LANs in a hierarchical structure?

    <p>Distribution Network</p> Signup and view all the answers

    Which IPv6 addressing mode sends packets to the nearest node in a specified group of nodes?

    <p>Anycast</p> Signup and view all the answers

    What is the primary function of a malware scanner?

    <p>Checking files for viruses</p> Signup and view all the answers

    Which layer is responsible for the signaling of 1's and 0's in network communication?

    <p>Physical Layer</p> Signup and view all the answers

    What type of current is used in analog communications like AC appliances?

    <p>Alternating Current (AC)</p> Signup and view all the answers

    What is the primary difference between circuit-switched and packet-switched networks?

    <p>Packet-switched networks break data into packets for transmission, while circuit-switched networks offer dedicated resources.</p> Signup and view all the answers

    What does IPv6 provide that IPv4 lacks?

    <p>IPv6 offers larger address space, while IPv4 provides more efficient routing.</p> Signup and view all the answers

    What is the main function of the Media Access Control (MAC) sublayer in the Data Link Layer?

    <p>Physical Addressing</p> Signup and view all the answers

    In networking, what is the purpose of a crossover cable?

    <p>To directly connect devices with different pin configurations</p> Signup and view all the answers

    Which protocol is responsible for ensuring reliable delivery of data packets in the TCP/IP suite?

    <p>Transmission Control Protocol (TCP)</p> Signup and view all the answers

    What characteristic is essential for high-speed data transmission?

    <p>Low Bit Error Rate</p> Signup and view all the answers

    What does a patch cable with straight-through configuration enable?

    <p>Connection between devices with similar pin configurations</p> Signup and view all the answers

    What does the Logical Link Control (LLC) sublayer assist in?

    <p>Establishing logical links between nodes over the physical medium</p> Signup and view all the answers

    What is the primary function of the data link layer in networking?

    <p>Handle network addressing and error detection</p> Signup and view all the answers

    In networking, what is the purpose of a static route?

    <p>Manually define specific routing paths</p> Signup and view all the answers

    What is a possible consequence of a packet needing many hops to reach its destination in networking?

    <p>Increased network congestion</p> Signup and view all the answers

    What method does a switch use to forward frames with unknown destination MAC addresses in a LAN?

    <p>Send the frames to all ports except the source port</p> Signup and view all the answers

    What is one characteristic of cut-through switching in networking?

    <p>Reduces latency by forwarding frames immediately</p> Signup and view all the answers

    How do VLANs improve network efficiency in a physical network?

    <p>Segment the network into isolated networks</p> Signup and view all the answers

    What issue do Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP) aim to prevent in switching networks?

    <p>Network loops</p> Signup and view all the answers

    What is a drawback of Layer 2 switches creating flat network topologies?

    <p>Increased broadcast frame distribution</p> Signup and view all the answers

    What are LAN switches responsible for creating in a network?

    <p>MAC address tables.</p> Signup and view all the answers

    What is the primary function of a switch in a network?

    <p>Make filtering and forwarding decisions based on the destination address</p> Signup and view all the answers

    Which network device extends the reach of a network by overcoming attenuation?

    <p>Repeater</p> Signup and view all the answers

    What is the key feature of a structured wiring system for network infrastructure?

    <p>Modular cabling solution for high-speed bandwidth and rapid changes</p> Signup and view all the answers

    What is the primary purpose of the ARP broadcast query in a network?

    <p>To discover the destination MAC address of a node</p> Signup and view all the answers

    Which network technology allows multiple wavelengths of light to travel through a single fiber strand?

    <p>Wavelength division multiplexing</p> Signup and view all the answers

    In IPv6 networks, what protocol serves a function similar to ARP in IPv4 networks?

    <p>Neighbor Discovery Protocol (NDP)</p> Signup and view all the answers

    What is the primary purpose of an edge network in a network infrastructure?

    <p>Support desktop workstation LAN connections</p> Signup and view all the answers

    What does the Layer 3 network device use to make path decisions for IP packet forwarding?

    <p>Source/destination IP addresses</p> Signup and view all the answers

    Which type of LAN consists of users and devices located in the same part of a building?

    <p>Workgroup LAN</p> Signup and view all the answers

    What differentiates a metropolitan area backbone from a campus backbone network?

    <p>Coverage area</p> Signup and view all the answers

    What is characteristic of a collapse backbone network topology?

    <p>Multiple access switches connected to high-capacity backbone switches</p> Signup and view all the answers

    Which layer of the OSI model is responsible for breaking down data into packets for transmission?

    <p>Transport layer</p> Signup and view all the answers

    'Inter-building communication' is a key function of which type of network backbone?

    <p>'Metropolitan area' Backbone</p> Signup and view all the answers

    What is the main function of the Data Link layer in the OSI model?

    <p>Ensuring reliable communication within LANs</p> Signup and view all the answers

    'Providing high-speed connectivity' is a primary function associated with which type of backbone network?

    <p>'Core' Backbone Network</p> Signup and view all the answers

    What is the primary purpose of the Packet Switching technique?

    <p>Breaking data into smaller packets for efficient transmission</p> Signup and view all the answers

    'Supporting PCs and workstations to access network resources' is a key role of which type of network?

    <p>'Access' Network</p> Signup and view all the answers

    Which layer in the OSI model interacts directly with end users and network programs?

    <p>Application Layer</p> Signup and view all the answers

    What service does UDP provide that makes it ideal for broadcast or simple messages?

    <p>Stateless, connectionless data transmission</p> Signup and view all the answers

    Which networking protocol is responsible for defining the seven layers of a communication system?

    <p>OSI</p> Signup and view all the answers

    What is the purpose of the flow label in IPV6?

    <p>Identifying packets belonging to the same flow or stream of data</p> Signup and view all the answers

    What does the Traffic field in IPV6 represent?

    <p>Packet priority and handling instructions</p> Signup and view all the answers

    What is the main function of Address Resolution in networking?

    <p>Mapping an IP address to a MAC address</p> Signup and view all the answers

    What is the significance of Encapsulation in an IP network?

    <p>Adding IP header information to packets</p> Signup and view all the answers

    What does Port Address Translation (PAT) achieve in networking?

    <p>Mapping multiple private IP addresses to a single public IP address</p> Signup and view all the answers

    What does the Time to Live (TTL) value in an IP packet header represent?

    <p>Maximum number of network hops before packet discard</p> Signup and view all the answers

    'Connectionless protocol' refers primarily to which protocol?

    <p>'Internet Control Message Protocol (ICMP)'</p> Signup and view all the answers

    'Virtual Circuits' in networking are supported by which layer?

    <p>Layer 3 - Network Layer</p> Signup and view all the answers

    What is the primary advantage of using a loopback address?

    <p>Ensuring proper functioning of the TCP/IP stack.</p> Signup and view all the answers

    What does a classful network refer to in address architecture?

    <p>Limitation of networks based on specific address classes.</p> Signup and view all the answers

    What is the primary role of a NIC in a computer network?

    <p>Enabling devices to connect to a network medium</p> Signup and view all the answers

    In internetworking at the Data Link Layer, what is the function of a bridge?

    <p>Learning MAC addresses for device communication</p> Signup and view all the answers

    What is the purpose of a Network Layer address, such as an IP address?

    <p>To route data packets through the network</p> Signup and view all the answers

    What does a router primarily do in relation to IP packets in a network?

    <p>Maintain IP routing tables for path determination</p> Signup and view all the answers

    What distinguishes peer-to-peer internetworking from client/server architecture?

    <p>Peer-to-peer does not depend on a central server for connections</p> Signup and view all the answers

    At the Network Layer, what is the key function of routers?

    <p>Building IP routing tables for path determination</p> Signup and view all the answers

    What is a key advantage of using different ports for different protocols?

    <p>Maintains individual connection separation</p> Signup and view all the answers

    Which responsibility is NOT attributed to the transport layer of the TCP/IP model?

    <p>Deciding on the route to transmit data</p> Signup and view all the answers

    What is one advantage of Cut-Through Switching?

    <p>Lower latency</p> Signup and view all the answers

    In a structured wiring system, what is the purpose of an Intermediate Distribution Frame (IDF)?

    <p>Connectivity to the data center facility</p> Signup and view all the answers

    How do switches contribute to making an ethernet network faster?

    <p>Isolating traffic between frequently communicating nodes</p> Signup and view all the answers

    What must be addressed in the design of an end-to-end solution according to the text?

    <p>Edge networks and building backbone networks</p> Signup and view all the answers

    Which of the following is a characteristic of Store and Forward Switching?

    <p>Higher latency for complete frame verification before forwarding</p> Signup and view all the answers

    What role do VLANs play in network communication?

    <p>'Isolate network traffic'</p> Signup and view all the answers

    'Efficient resource utilization' is a key advantage of which network type?

    <p>'Packet-Switched network'</p> Signup and view all the answers

    'Campus or building backbone distribution' typically consists of which type of cabling?

    <p>'Twisted-pair bundled cabling'</p> Signup and view all the answers

    What is the primary function of Wireshark's Promiscuous Mode?

    <p>To monitor all network traffic on the same network segment</p> Signup and view all the answers

    How does a coaxial transmission medium differ from a glass/fiber transmission medium?

    <p>Glass/fiber cables have multiple strands within the same sheath while coaxial cables do not</p> Signup and view all the answers

    In TCP/IP Suite, what is the main responsibility of the Application layer protocols?

    <p>Passing messages along with destination addresses to lower-layer protocols</p> Signup and view all the answers

    How can air impact the transmission of 1's and 0's in a network?

    <p>Moisture in the air can cause errors in data transmission</p> Signup and view all the answers

    What does the choice between Layer 2 and Layer 3 switches depend on primarily?

    <p>Network traffic and real-time application needs</p> Signup and view all the answers

    Which component is crucial to consider when designing Ethernet networks for IP phones and powered devices?

    <p>Capability for Power over Ethernet (PoE)</p> Signup and view all the answers

    What is the primary purpose of incorporating ASIC, dual processors, and LAN switching in switch architecture?

    <p>To improve network performance</p> Signup and view all the answers

    In networking, what is the main responsibility of the physical layer in the OSI model?

    <p>Managing electrical, mechanical, and functional aspects of data transfer</p> Signup and view all the answers

    What distinguishes TCP/IP from OSI regarding network communication?

    <p>'TCP/IP is a protocol suite for internet communications while OSI offers a network architecture framework'</p> Signup and view all the answers

    What happens if two devices on an Ethernet LAN share the same MAC address?

    <p>Network errors and collisions occur</p> Signup and view all the answers

    Which protocol assists in ensuring transparency for upper layer protocols in the Internet Layer of TCP/IP?

    <p>Internet Protocol Security (IPSec)</p> Signup and view all the answers

    What is the main responsibility of the network access layer in TCP/IP related to data packets?

    <p>Handles packets between nodes of the same LAN</p> Signup and view all the answers

    How does IEEE 802.1Q Ethernet tagging contribute to network functionality?

    <p>Facilitates VLAN extension across physical switches</p> Signup and view all the answers

    What is a significant disadvantage of circuit-switched networks?

    <p>Vulnerability to failure</p> Signup and view all the answers

    What role does the destination perform in a packet-switched network?

    <p>Packet reassembly and order management</p> Signup and view all the answers

    How do workgroup LANs handle connectivity needs according to design considerations?

    <p>Support various-sized switches for connectivity</p> Signup and view all the answers

    Which layer of the TCP/IP model corresponds to the data link and physical layers of the OSI model?

    <p>Network Access Layer</p> Signup and view all the answers

    More Like This

    Uji Pengetahuanmu tentang SIP!
    5 questions
    Network Protocols and Security Quiz
    16 questions
    Use Quizgecko on...
    Browser
    Browser