Transport Layer Protocols and Utilities
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which two characteristics of switches are true?

  • Switches cause more data collisions of the data that they receive
  • Switches are capable of sending and receiving data at the same time (correct)
  • Switches send each frame to all of the computers that are connected to them
  • Switches identify the intended destination of the data that they receive (correct)
  • Which network device interconnects computers in a workgroup and provides the best throughput?

  • Hub
  • Managed switch (correct)
  • Router
  • Unmanaged switch
  • Which command-line tool in Linux should you use to list a host’s active incoming connections?

  • dig
  • host
  • ip addr
  • netstat (correct)
  • Which type of network covers the broadest area?

    <p>WAN</p> Signup and view all the answers

    Which is an advantage of dynamic routing?

    <p>It automatically maintains routing tables</p> Signup and view all the answers

    Which hardware is required to properly connect a LAN to a WAN?

    <p>Router</p> Signup and view all the answers

    After migrating servers to cloud-based virtual machines, which two administrative responsibilities are reduced?

    <p>Managing physical server security</p> Signup and view all the answers

    In troubleshooting internet connectivity issues, which two actions should you complete?

    <p>Check the router for proper connectivity</p> Signup and view all the answers

    Which protocol operates at the transport layer of the TCP model?

    <p>UDP</p> Signup and view all the answers

    What are two purposes of the ping utility? (Choose 2)

    <p>To self-test a host’s own network interface</p> Signup and view all the answers

    In addition to switching, which feature is specific to a multilayer switch?

    <p>Provides Layer 3 routing functions</p> Signup and view all the answers

    Which command displays the ports that your computer is listening for?

    <p>netstat</p> Signup and view all the answers

    What are two characteristics of a wired Ethernet network topology? (Choose 2)

    <p>It can negotiate different transmission speeds</p> Signup and view all the answers

    What does each IPv4 address consist of?

    <p>A 32-bit binary number divided into octets</p> Signup and view all the answers

    Which feature is specifically relevant to a Type 2 hypervisor?

    <p>Requires a host operating system to function</p> Signup and view all the answers

    Which service is associated with port number 25?

    <p>SMTP</p> Signup and view all the answers

    What configuration is necessary to enable internal clients with private IPv4 addresses to access the internet?

    <p>NAT</p> Signup and view all the answers

    Which three actions should you complete first when troubleshooting a customer's inability to access the internet?

    <p>Ask the customer to restart the modem</p> Signup and view all the answers

    Which protocol does the ping utility use for testing communication with a remote host?

    <p>ICMP</p> Signup and view all the answers

    Which statement about IoT devices is true?

    <p>IoT devices can operate independently within a network.</p> Signup and view all the answers

    Which address type corresponds to the range 224.0.0.0 – 239.255.255.255?

    <p>Multicast address</p> Signup and view all the answers

    Which statement regarding a switch's operation is false?

    <p>A switch sends broadcast frames to all ports.</p> Signup and view all the answers

    What type of cable is most suitable for a distance of six miles between two locations?

    <p>Single-mode fiber</p> Signup and view all the answers

    When communicating across a network, which option is NOT a typical protocol used?

    <p>DTP</p> Signup and view all the answers

    Which physical network topology provides fault-tolerant communication by providing redundant communication paths?

    <p>Mesh</p> Signup and view all the answers

    On a Windows computer, which utility should you use to determine whether your DNS service is properly resolving fully qualified domain names (FQDNs) to IP addresses?

    <p>nslookup</p> Signup and view all the answers

    Which option represents an IPv6 loopback address?

    <p>::1</p> Signup and view all the answers

    What tool should you use to test the fiber network connection between two buildings that is experiencing attenuation?

    <p>Optical time-domain reflectometer (OTDR)</p> Signup and view all the answers

    What is a primary concern regarding wireless network security?

    <p>The radio broadcast access method</p> Signup and view all the answers

    On a wireless router, what does SSID stand for?

    <p>The broadcast ID</p> Signup and view all the answers

    Which service primarily uses PTR and A records?

    <p>DNS</p> Signup and view all the answers

    What happens when a client's DHCP issued address expires?

    <p>The client attempts to renew its lease on the address.</p> Signup and view all the answers

    Which feature is unique to the Teredo tunneling protocol?

    <p>It enables the passing of IPv6 traffic through IPv4 networks</p> Signup and view all the answers

    What is the primary function of a VPN?

    <p>A secure connection through public networks</p> Signup and view all the answers

    Which network topology is foundational to the design of the internet?

    <p>Mesh</p> Signup and view all the answers

    What is the top-level domain of ftp.sunsetweb.org?

    <p>org</p> Signup and view all the answers

    Which wireless encryption type presents the greatest risk of interception?

    <p>WEP</p> Signup and view all the answers

    What function is specific to a multilayer switch besides switching?

    <p>Provides Layer 3 routing functions</p> Signup and view all the answers

    To protect an internal network when setting up a public-facing web server, what should you do?

    <p>Deploy the web server in a perimeter network (also known as a DMZ)</p> Signup and view all the answers

    Which technology is used to extend an internal network across shared or public networks?

    <p>VPN</p> Signup and view all the answers

    Which network hardware tool is best for determining the capability of a cable to support 1000Mbps full-duplex transmission?

    <p>Cable tester</p> Signup and view all the answers

    What is a key advantage of using STP cable in high interference areas?

    <p>To reduce the risk of external interference</p> Signup and view all the answers

    What type of network consists of routed private Wi-Fi networks at a single location?

    <p>Intranet</p> Signup and view all the answers

    Which routing option is known for its fault tolerance capabilities?

    <p>Dynamic routing</p> Signup and view all the answers

    What is the primary purpose of incorporating VLANs into a network?

    <p>To reduce the number of nodes in a broadcast domain</p> Signup and view all the answers

    Which medium is the least susceptible to external interference including EMI and RFI?

    <p>Fiber optic</p> Signup and view all the answers

    What type of connection does a VPN provide?

    <p>A private network using a public infrastructure</p> Signup and view all the answers

    Which Ethernet cable type should be used for drops passing near heavy manufacturing equipment to reduce interface?

    <p>STP Cat5e</p> Signup and view all the answers

    Study Notes

    Protocol at Transport Layer

    • UDP operates at the transport layer of the TCP model.

    Port Numbers and Services

    • Port 21: FTP
    • Port 25: SMTP
    • Port 53: DNS
    • Port 80: HTTP
    • Port 443: HTTPS

    Ping Utility

    • Two purposes of the ping utility:
      • Self-test a host's network interface
      • Determine if a host is reachable

    Multilayer Switch Feature

    • Translates between network protocols
    • Provides Layer 3 routing functions

    Netstat Command

    • Used to display ports a computer is listening on

    Type 2 Hypervisor and Virtual Machines

    • Rebooting one virtual machine does not automatically reboot the other virtual machines.
    • Rebooting the host machine does not affect other virtual machines.
    • Rebooting a virtual machine requires rebooting the physical server first.

    Wired Ethernet Network Topology

    • Uses network adapters with physical IP addresses
    • Typically employs twisted pair or fiber optic media

    IPv4 Address

    • Consist of a network ID and host ID

    Network Address Translation (NAT)

    • Used to enable internal clients with private IPv4 addresses from a router

    Troubleshooting Internet Access Issues

    • Perform a line test to check connectivity between the ISP and customer.
    • Ask the customer to restart the modem.
    • Ask the customer to check status lights on the modem.

    Ping Utility Protocol

    • ICMP

    Internet of Things (IoT)

    • IoT devices have IP addresses
    • IoT devices often communicate with a network automatically without human interaction.
    • Examples include smart thermostats and light bulbs.

    IP Address Ranges

    • Loopback addresses: 127.0.0.0 - 127.255.255.255
    • Multicast addresses: 224.0.0.0 - 239.255.255.255
    • Private network addresses: 192.168.0.0 - 192.168.255.255

    Switch Functionality

    • Unicast frames are sent to a single destination port.
    • If a switch does not know where to send a frame, it floods the port.
    • Switches do not send broadcast frames to only the uplink port. (Incorrect).

    Network Cable Type

    • Multi-mode fiber is appropriate for shorter distances (e.g., six miles/ten kilometers).

    Switch Characteristics

    • Switches can send and receive data at the same time (simultaneously).
    • Switches identify intended destinations of data they receive (prevent collisions).

    Network Device for Workgroup

    • Managed switch

    Linux Command-Line Tool for Connections

    • Netstat is the command-line tool for listing a host's active incoming connections.

    Broadest Network Type

    • WAN

    Dynamic Routing Advantage

    • Automatically maintains routing tables

    LAN to WAN Connection

    • Router

    Cloud-Based Virtual Machines and Reduced Responsibilities

    • Backing up application data
    • Managing permissions to shared documents

    Troubleshooting Website Access Issues

    • Checking the router for proper connectivity
    • Checking computer IP addresses
    • Contacting the internet service provider

    Wireless Authentication Method

    • Wi-Fi Protected Access 2 (WPA2)

    Teredo Tunneling Protocol

    • Enables the passing of IPv6 traffic through IPv4 networks

    VPN

    • Provides a secure connection through public networks

    Internet Topology

    • Mesh topology

    Top-Level Domain (TLD)

    • org

    IP Address Configuration

    • Wireless adapter configured via DHCP
    • Ethernet adapter configured via APIPA

    Wireless Encryption Susceptibility

    • WEP

    Multilayer Switch Function

    • Provides Layer 3 routing functions

    Perimeter Network (DMZ)

    • Deploy the web server in a perimeter network to protect the internal network from intrusion. (a DMZ).

    Technology for Extending Internal Networks

    • VPN

    Network Cable Testing Tool (cable bundle without labels)

    • Time-domain reflectometer (TDR)

    Ethernet Cable Type for Shorter Distance

    • UTP Cat5e

    Network Hardware Tool for 1000Mbps Transmission

    • Time-domain reflectometer (TDR)

    Fault-Tolerant Routing Option

    • Dynamic routing

    Type of Network for Private Wi-Fi Networks

    • Intranet

    VLAN Purpose

    • To reduce the number of broadcast domains.

    Justification for STP Cable

    • Routing cables through areas with high external interference.

    Least Susceptible Media to Interference

    • Fiber optic

    VPN Definition

    • A secure private connection over a public network

    Fault-Tolerant Network Topology

    • Mesh

    DNS Utility Tool

    • nslookup

    IPv6 Loopback Address

    • ::1

    Fiber Network Testing Tool

    • Optical time-domain reflectometer (OTDR)

    Wireless Network Security Concern

    • Inability to encrypt transmission

    Wireless Router Broadcast ID

    • SSID

    Service Utilising PTR and A Records

    • DNS

    VLAN Traffic Port Type

    • Trunk port

    DHCP Issue Indicator

    • 169.254.1.15 (this address is used when DHCP fails to assign an address)

    DHCP Lease Expiration

    • The client attempts to renew its lease.

    Linux Command for Incoming Connections

    • Netstat

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers essential concepts at the transport layer, including the functions of UDP, common port numbers, and the ping utility. Additionally, it delves into multilayer switches, netstat command usage, hypervisors, and wired Ethernet network topology. Test your knowledge on these critical networking topics.

    Use Quizgecko on...
    Browser
    Browser