Networking Concepts Quiz
67 Questions
105 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which layer in the TCP model has TCP as its main protocol?

  • Network
  • Application
  • Transport (correct)
  • Data Link
  • What is the first step in troubleshooting a network-related problem in a small to medium-sized business?

    Identify the problem

    Ping is used to see if one can connect to a destination's IP address.

    True

    Traceroute shows actual IP addresses on a path from a source to a destination.

    <p>False</p> Signup and view all the answers

    The host command performs DNS lookups.

    <p>True</p> Signup and view all the answers

    Netstat shows open and listening ports on a device.

    <p>True</p> Signup and view all the answers

    Which type of network cables can carry signals over the longest distances?

    <p>Single-mode fiber</p> Signup and view all the answers

    A layer 2 switch is also called a bridge.

    <p>True</p> Signup and view all the answers

    A layer 2 switch uses routing tables.

    <p>False</p> Signup and view all the answers

    A switch floods ports if it does not know where to send a packet.

    <p>True</p> Signup and view all the answers

    A Firewall can be a hardware device.

    <p>True</p> Signup and view all the answers

    A Firewall can be a software package.

    <p>True</p> Signup and view all the answers

    A Firewall is a special room to protect servers.

    <p>False</p> Signup and view all the answers

    A secondary name server gets its data from another name server using a zone transfer.

    <p>True</p> Signup and view all the answers

    AAAA records resolve hostnames to IPv4 addresses.

    <p>False</p> Signup and view all the answers

    Entries in a HOSTS file on a local computer take precedence over DNS.

    <p>True</p> Signup and view all the answers

    A user in your company cannot connect to any of the servers which are on the 192.168.1.0 network. The problem is?

    <p>There is no default gateway</p> Signup and view all the answers

    What is the solution for a user unable to connect to servers on the 192.168.1.0 network?

    <p>Configure a default gateway in the 10.1.3.x network</p> Signup and view all the answers

    Which are tunnels used to transmit IPv6 address information over IPv4? (Choose two)

    <p>Teredo</p> Signup and view all the answers

    What should you do to group all of the Administrative Assistants' computers to communicate as if they were on the same network?

    <p>Configure a VLAN</p> Signup and view all the answers

    Which command-line tool is used to display IP address information and DHCP server information?

    <p>Ipconfig/all</p> Signup and view all the answers

    How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users?

    <p>VPN</p> Signup and view all the answers

    Which one of the following is a second-level domain?

    <p>In-addr.arpa</p> Signup and view all the answers

    What is the main method used by firewalls to filter traffic? (Choose two)

    <p>Protocols</p> Signup and view all the answers

    A router is a device that functions primarily on the Data Link layer of the OSI Model.

    <p>False</p> Signup and view all the answers

    What type of connection allows for sending and receiving data simultaneously?

    <p>Full duplex</p> Signup and view all the answers

    What type of VPN should you set up between two companies collaborating on a project?

    <p>Site to site</p> Signup and view all the answers

    Match the following networking functions with their definitions:

    <p>Allows or blocks data packets = Firewall Authenticates a user from an external network = Remote Access Server Distributes IP addresses = DHCP Makes a request from a private IP address routable = NAT Uses a public network for private data communications = VPN</p> Signup and view all the answers

    Match the following connection types with their descriptions:

    <p>Uses connections over shared broadband = Cable modems Uses dedicated phone lines to connect to telco provider offices = DSL Uses two 64Kbps channels = ISDN</p> Signup and view all the answers

    A router is used to separate multiple networks.

    <p>True</p> Signup and view all the answers

    A VLAN is typically configured on a router.

    <p>False</p> Signup and view all the answers

    NAT is the mapping of a private LAN IP address to a public IP address.

    <p>True</p> Signup and view all the answers

    Public websites are accessed through port 25.

    <p>False</p> Signup and view all the answers

    Secured websites are accessed through port 443 by default.

    <p>True</p> Signup and view all the answers

    Unsecured websites are accessed through port 80 by default.

    <p>True</p> Signup and view all the answers

    An example of a physical ring topology would be what?

    <p>Eight hubs connected to a single switch</p> Signup and view all the answers

    The cable in the box is a _____ cable.

    <p>Crossover</p> Signup and view all the answers

    In which type of connection would a crossover cable be used?

    <p>Switch and switch</p> Signup and view all the answers

    What is indicated by the portion of the diagram labeled 'A'?

    <p>Internet</p> Signup and view all the answers

    What is indicated by the portion of the diagram labeled 'B'?

    <p>Intranet</p> Signup and view all the answers

    What is indicated by the portion of the diagram labeled 'C'?

    <p>Extranet</p> Signup and view all the answers

    A mesh network has to have termination points at both ends of the network.

    <p>False</p> Signup and view all the answers

    What is the physical topology of the mentioned network?

    <p>Mesh</p> Signup and view all the answers

    How many connections are there among the routers?

    <p>6</p> Signup and view all the answers

    Which two types of servers are typically placed in a perimeter network?

    <p>Email server</p> Signup and view all the answers

    What must be changed to receive an IP address from the DHCP service on the router?

    <p>Enable obtain an IP address automatically</p> Signup and view all the answers

    How should the DNS address be obtained after setting DHCP?

    <p>Automatically, through the DHCP server</p> Signup and view all the answers

    Match the following ping commands with their descriptions:

    <p>Assigns a specific number of packets to transmit = Ping -n Continuously pings a remote host until stopped = Ping -t Sends four packets to the local loopback address = Ping 127.0.0.1 Specifies the size of the packet to transmit = Ping -l</p> Signup and view all the answers

    Match the following cable types with their speed capacities:

    <p>1 GBps = Cat5e 10 Mbps = Cat3 100 Mbps = Cat5</p> Signup and view all the answers

    Which two options are valid IP addresses you could assign to a computer on the same network as a router configured with an interface of 192.168.1.100?

    <p>192.168.1.254</p> Signup and view all the answers

    What does 'WAN' refer to in networking?

    <p>DSL</p> Signup and view all the answers

    In which directions can communication occur between layers of the OSI model? (Choose three)

    <p>To peer layer in other networked computer systems</p> Signup and view all the answers

    Which three layers on the OSI model make up the Application layer on the TCP model? (Choose three)

    <p>Application</p> Signup and view all the answers

    What is the physical topology of this network?

    <p>Star</p> Signup and view all the answers

    What is indicated by the ranges 192.168.0.0 - 192.168.255.255?

    <p>Private network addresses</p> Signup and view all the answers

    What is indicated by the ranges 224.0.0.0 - 239.255.255.255?

    <p>Multicast addresses</p> Signup and view all the answers

    What is indicated by the ranges 75.0.0.0 - 75.255.255.255?

    <p>Public network addresses</p> Signup and view all the answers

    You should use a _____ cable to connect each computer to the hub.

    <p>Straight-through</p> Signup and view all the answers

    You should use a _____ cable to connect each hub to the switch.

    <p>Crossover</p> Signup and view all the answers

    What is the primary disadvantage of a bus topology?

    <p>The network has a single point of failure</p> Signup and view all the answers

    Which IP address in a routing table signifies a default route?

    <p>0.0.0.0</p> Signup and view all the answers

    Which is a characteristic of peer to peer networks?

    <p>Usually connects 10 or fewer devices</p> Signup and view all the answers

    What best describes a virtual machine?

    <p>Multiple operating systems running on one physical computer</p> Signup and view all the answers

    Which tool should you use to test if your Ethernet cables are wired correctly?

    <p>Cable tester</p> Signup and view all the answers

    Which type of wireless network does not have a centralized device, such as a wireless access point or wireless router?

    <p>Ad hoc</p> Signup and view all the answers

    Which role needs to be added to an on-premises Windows Server in order to enable routing through the server?

    <p>Remote Access</p> Signup and view all the answers

    What is the local address in IPv6?

    <p>::1</p> Signup and view all the answers

    Study Notes

    Transport Layer

    • TCP is the main protocol in the Transport layer of the TCP model.

    Troubleshooting Steps

    • The initial step in diagnosing network problems in small to medium-sized businesses is identifying the issue.

    Network Commands

    • Ping tests connectivity to a destination IP address.
    • Traceroute displays IP addresses along the path from source to destination.
    • The host command performs DNS lookups.
    • Netstat reveals open and listening ports on a device.

    Network Cabling

    • Single-mode fiber cables can carry signals over the longest distances.

    Layer 2 Switches

    • A layer 2 switch is also known as a bridge.
    • Layer 2 switches do not use routing tables and flood ports when the destination is unknown.

    Firewalls

    • Firewalls can be either hardware devices or software packages, but they are not physical rooms for server protection.

    DNS and HOSTS File

    • A secondary name server obtains data from another server via zone transfer.
    • AAAA records resolve hostnames to IPv6 addresses.
    • Entries in a HOSTS file take precedence over DNS entries.

    Network Connectivity Issue

    • A common issue for users unable to connect to a specific network is the absence of a default gateway; configuring a default gateway in the appropriate network can resolve this.

    IPv6 Tunneling

    • ISATAP and Teredo are tunneling protocols for transmitting IPv6 information over IPv4.

    VLAN Configuration

    • To enable communication among a group of computers located in different areas, configure a Virtual Local Area Network (VLAN).

    IP Addressing Tools

    • The command ipconfig /all displays detailed IP and DHCP server information.

    Secure Communications

    • Virtual Private Networks (VPNs) are used to secure messages over public networks from unauthorized access.

    Domain Names

    • An example of a second-level domain is "in-addr.arpa".

    Traffic Filtering by Firewalls

    • Firewalls primarily filter traffic based on ports and protocols.

    Router Functionality

    • Routers operate primarily at the Network layer, not the Data Link layer.

    Connection Types

    • Full duplex connections allow simultaneous sending and receiving of data.

    VPN Types

    • Site-to-site VPNs are used to connect two networks for collaboration.

    Network Component Functions

    • Firewalls control data packet access, Remote Access Servers authenticate users, DHCP distributes IP addresses, NAT manages private IP routing, and VPNs facilitate secure communications over public networks.

    Internet Connection Types

    • Cable modems use shared broadband, DSL uses dedicated lines, and ISDN employs two 64Kbps channels.

    Router and NAT Functions

    • A router separates multiple networks; NAT translates private IP addresses to public ones; VLAN configurations typically occur on switches, not routers.

    Common Ports

    • Port 25 is used for email, while ports 80 and 443 are used for unsecured and secured web traffic respectively.

    Topology Considerations

    • Ring topology is often mistaken for star topology; the physical topology of a network can significantly affect performance and reliability.

    Networking Standards

    • A crossover cable is used to connect similar devices, like switch to switch, while straight-through cables connect dissimilar devices, like computers to switches.

    Network Address Ranges

    • Private network addresses range from 192.168.0.0 to 192.168.255.255, multicast addresses from 224.0.0.0 to 239.255.255.255, and public network addresses cover the remainder.

    Bus Topology Disadvantage

    • A major drawback of bus topology is its reliance on a single cable, representing a single point of failure.

    Default Routing

    • The default route in a routing table is indicated by the address 0.0.0.0.

    Peer-to-Peer Networks

    • Peer-to-peer networks typically connect 10 or fewer devices, allowing direct communication between users.

    Virtual Machines

    • Virtual machines enable multiple operating systems to run on a single physical computer, enhancing resource utilization.

    Cable Testing

    • A cable tester is essential for verifying the correct wiring of Ethernet cables.

    Wireless Networking

    • Ad hoc networks operate without centralized devices like routers or access points.

    Routing on Windows Servers

    • To enable routing on an on-premises Windows Server, the Remote Access role must be added.

    IPv6 Local Address

    • The local IPv6 address (::1) is the loopback address, analogous to 127.0.0.1 in IPv4.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on core networking concepts, including the Transport layer, common network commands, and cabling types. This quiz covers everything from TCP to firewalls, ensuring you have a comprehensive understanding of network fundamentals.

    More Like This

    Transport Layer Fundamentals Quiz
    5 questions
    Networking Fundamentals Quiz
    30 questions
    Testout Domain 9: Networking Fundamentals
    17 questions
    Use Quizgecko on...
    Browser
    Browser