Network Protocols Overview
304 Questions
2 Views
3.7 Stars

Network Protocols Overview

Created by
@AffectionateGalaxy

Questions and Answers

What is the purpose of the 'ipconfig' command in Windows?

To display network configuration details like IP address and subnet mask

Which command in Windows is used to list the contents of a directory?

Dir

What is the purpose of a default gateway in networking?

To send packets to external networks

What is the main function of ARP in TCP/IP?

<p>Map IP addresses to MAC addresses</p> Signup and view all the answers

What does the 'arp -a' command do in networking?

<p>Displays the current contents of the ARP cache</p> Signup and view all the answers

What does Wireshark's Promiscuous Mode do?

<p>Captures all network packets passing through an interface</p> Signup and view all the answers

Which layer of the OSI model is responsible for making a connection with the source destination host while reliably sending packets over the network?

<p>Transport Layer</p> Signup and view all the answers

If a computer attempts to ping a machine not on the local LAN without a default gateway set, what error message is returned?

<p>&quot;Destination host unreachable&quot;</p> Signup and view all the answers

What does TCP maintain during the three phases: connection setup, data transmission, and connection termination?

<p>Reliability and Connection Orientation</p> Signup and view all the answers

What type of message does HTTP use to signify that an image was successfully transferred to the client?

<p>200 (OK) status code</p> Signup and view all the answers

What does the ARP reply send to the device that is sending the ARP request?

<p>Unicast packet</p> Signup and view all the answers

Which PDU is associated with the physical layer of the OSI model?

<p>Bits</p> Signup and view all the answers

What happens to the TTL value when a packet traverses a router?

<p>It decreases</p> Signup and view all the answers

What is the purpose of media converters in networking?

<p>Converting network signals between different interfaces</p> Signup and view all the answers

What are the flags set in each segment of the three-way handshake in TCP communication?

<p>SYN, SYN-ACK, ACK</p> Signup and view all the answers

What is a drawback of the host-based architecture?

<p>Scalability and performance tied to network bandwidth</p> Signup and view all the answers

Which architecture leverages workstation processing?

<p>Client/server architecture</p> Signup and view all the answers

In the Session Layer, which mode of communication allows both ends to communicate simultaneously?

<p>Full duplex</p> Signup and view all the answers

What is a benefit of Peer-to-peer (P2P) architecture?

<p>Provides confidence in data sharing</p> Signup and view all the answers

Which communication protocol is used for sending and receiving email messages?

<p>Simple Mail Transfer Protocol (SMTP)</p> Signup and view all the answers

What is a drawback of the client/server architecture?

<p>Uses excessive network I/O</p> Signup and view all the answers

Which architecture is best suited for a collaborative environment where peers trust each other?

<p>Peer-to-peer (P2P) architecture</p> Signup and view all the answers

What benefit does Cloud computing/N-tier architecture offer in terms of scalability?

<p>Maximizes data and processing distribution</p> Signup and view all the answers

What issue is faced when using Peer-to-peer (P2P) architecture due to the lack of a central authority?

<p>Difficult to provide confidence in data sharing</p> Signup and view all the answers

What type of network topology is characterized by connecting all devices via a single cable running in one direction?

<p>Bus</p> Signup and view all the answers

In a ring topology, if one node fails or bandwidth exceeds its capacity, what happens to the network?

<p>It will fail</p> Signup and view all the answers

Which network topology arranges devices in a web-like structure of interconnected nodes?

<p>Mesh</p> Signup and view all the answers

What is the general rule regarding network ports to enhance security?

<p>Implement a deny-all principle and enable just the ports needed</p> Signup and view all the answers

Which port number is commonly used for HTTPS communication?

<p>Port 443</p> Signup and view all the answers

Which architecture type involves a large mainframe computer performing all functions with terminals enabling user interactions?

<p>Host-based architecture</p> Signup and view all the answers

What is the consequence of data flooding in a mesh network?

<p>Network congestion and increased traffic</p> Signup and view all the answers

Which port is associated with the Domain Name Service (DNS)?

<p>Port 53</p> Signup and view all the answers

How does a star network topology handle failure compared to other topologies?

<p>Only central node failure affects the network</p> Signup and view all the answers

'Client/server' architecture distinguishes itself by having which key component?

<p>'User interface'</p> Signup and view all the answers

What is the main purpose of Network Address Translation (NAT)?

<p>To conserve the number of public IP addresses and enhance security</p> Signup and view all the answers

Which sublayer in the OSI model is responsible for controlling access to the physical transmission medium?

<p>Data Link Layer</p> Signup and view all the answers

What protocol is commonly used in Ethernet networks to avoid collisions when multiple devices attempt to transmit simultaneously?

<p>CSMA/CD (Carrier Sense Multiple Access with Collision Detection)</p> Signup and view all the answers

What does the Logical Link Control (LLC) sublayer provide in the OSI model?

<p>Framing and flow control services</p> Signup and view all the answers

What are the 6 components of a structured wire system?

<p>Entrance facilities, equipment room, backbone cabling, telecommunications room, horizontal cabling, work area</p> Signup and view all the answers

Which network topology is characterized by computers connected in a closed circle?

<p>Ring</p> Signup and view all the answers

What type of network connection requires line-of-sight known as the Fresnel Zone?

<p>&quot;Microwave Radio&quot;</p> Signup and view all the answers

Where does a patch panel usually reside in a networking setup?

<p>&quot;Telecommunications Room&quot;</p> Signup and view all the answers

What characteristic distinguishes a local area network (LAN) from a wide area network (WAN)?

<p>&quot;LANs connect devices within a limited physical space while WANs connect devices across larger distances&quot;</p> Signup and view all the answers

"Token Ring" is an example of what kind of protocol?

<p>&quot;MAC Protocol&quot;</p> Signup and view all the answers

What is the main difference between TCP and UDP?

<p>TCP is connection-oriented, while UDP is connectionless</p> Signup and view all the answers

Which protocol is used for error reporting, diagnostics, and exchanging control messages in a network?

<p>ICMP</p> Signup and view all the answers

What is the purpose of a patch panel in a network?

<p>To simplify changes and troubleshooting by organizing connections</p> Signup and view all the answers

In the context of networking devices, what does port density refer to?

<p>The number of physical sockets on a device</p> Signup and view all the answers

What does static routing involve?

<p>Manual configuration and selection of network routes</p> Signup and view all the answers

What is encapsulation in networking?

<p>Adding additional information to data as it travels through OSI or TCP/IP layers</p> Signup and view all the answers

What happens when an Ethernet broadcast frame is received on a LAN?

<p>It is processed by all devices on the LAN except the incoming port</p> Signup and view all the answers

What was ARPANET known for?

<p>The first public packet-switched computer network</p> Signup and view all the answers

What does HTTPS provide that HTTP doesn't, in terms of security?

<p>Encrypted connection</p> Signup and view all the answers

What type of cable is used for direct device-to-device connections?

<p>Crossover cable</p> Signup and view all the answers

What is the main difference between circuit-switched and packet-switched communication?

<p>Circuit-switched establishes a dedicated communication path, while packet-switched breaks data into packets for independent routing.</p> Signup and view all the answers

In terms of network technology, what is the primary function of a router?

<p>Determining the destination network based on IP address.</p> Signup and view all the answers

How does a switch differ from a router in a network environment?

<p>A switch maintains a table of MAC addresses, while a router maintains a routing table for destination networks.</p> Signup and view all the answers

Why is IP-based communication essential for interconnected networks in large geographical areas?

<p>It uses IP addressing to effectively route packets across the network.</p> Signup and view all the answers

What is the key difference between the OSI Model and the TCP/IP Model?

<p>The OSI Model has more layers than the TCP/IP Model.</p> Signup and view all the answers

How do data packets travel from a source to a destination in an IP-based network?

<p>Through intermediary devices like routers and switches for routing.</p> Signup and view all the answers

Which Layer is responsible for 'optionally encrypting' application layer data and ensuring data is presented in a readable format?

<p>Layer 6</p> Signup and view all the answers

What is the primary function of SOCKS protocol?

<p>To serve as a proxy server for network traffic on PORT 1080</p> Signup and view all the answers

What distinguishes IPv6 from IPv4?

<p>Address length, notation, headers, and capabilities</p> Signup and view all the answers

Which IEEE standard defines physical layer and MAC sub-layer for wired Ethernet networks?

<p>IEEE 802.3 Standard 10Base-T</p> Signup and view all the answers

What does TLS use to encrypt connections between nodes?

<p>Public-key cryptography</p> Signup and view all the answers

What is the function of L2TP protocol?

<p>To operate at Layer 5 for session management</p> Signup and view all the answers

'Upper layer protocols may need to define and maintain persistent connections' primarily refers to which layer of the OSI model?

<p>Layer 7: Application Layer</p> Signup and view all the answers

'IEEE 802.3 Standard 1000Base-LX' is associated with which type of Ethernet connection medium?

<p>'Single-mode fiber-optic cable'</p> Signup and view all the answers

'Web Browser' was first introduced by whom as part of a new protocol?

<p>'Tim Berners-Lee'</p> Signup and view all the answers

CMD is a command used to change the default gateway in Windows.

<p>False</p> Signup and view all the answers

Wireshark captures all network packets passing through the interface in Stealth Mode.

<p>False</p> Signup and view all the answers

ARP reply opcode is 2.

<p>True</p> Signup and view all the answers

The MAC address is formatted in decimal digits separated by commas.

<p>False</p> Signup and view all the answers

Ping is an ICMP request that echoes the request/reply of the target host.

<p>True</p> Signup and view all the answers

The 'dir' command in Windows lists the contents of a directory.

<p>True</p> Signup and view all the answers

Switches operate at Layer 3 of the OSI model.

<p>False</p> Signup and view all the answers

IP-based communication primarily relies on software tools like TCP and UDP.

<p>True</p> Signup and view all the answers

Packet-switched networks are more susceptible to latency compared to circuit-switched networks.

<p>True</p> Signup and view all the answers

The TCP/IP model has more layers than the OSI model.

<p>False</p> Signup and view all the answers

Routers are responsible for forwarding data packets between devices on the same network.

<p>False</p> Signup and view all the answers

In IP-based networks, data packets are exchanged without any source or destination information.

<p>False</p> Signup and view all the answers

SOCKS protocol is primarily used for email server communication.

<p>False</p> Signup and view all the answers

IPv6 has a shorter address length compared to IPv4.

<p>False</p> Signup and view all the answers

IEEE 802.3 Standard 100Base-TX uses optical fiber as the transmission medium.

<p>False</p> Signup and view all the answers

L2TP operates at Layer 5 of the OSI model.

<p>False</p> Signup and view all the answers

RPC is used to support remote procedure calls between processes on the same computer.

<p>False</p> Signup and view all the answers

Client/server architecture always relies on a mainframe computer to perform all functions.

<p>False</p> Signup and view all the answers

TLS uses symmetric cryptography for encrypting connections between nodes.

<p>False</p> Signup and view all the answers

Cloud computing/N-tier architecture is less complex to code for distributed infrastructure compared to other architectures.

<p>False</p> Signup and view all the answers

IMAP protocol stores emails locally on the client device.

<p>False</p> Signup and view all the answers

Peer-to-peer (P2P) architecture always requires a central authority to manage data sharing.

<p>False</p> Signup and view all the answers

IEEE 802.3 Standard 1000Base-SX uses single-mode fiber for Ethernet connections.

<p>False</p> Signup and view all the answers

The Session Layer allows only simplex communication between applications/computers.

<p>False</p> Signup and view all the answers

H.254 is a call control protocol used in multimedia communication.

<p>False</p> Signup and view all the answers

The Application Layer (Layer 7) does not provide network services directly to end-users through a user interface.

<p>False</p> Signup and view all the answers

TLS ensures data is presented in a readable format at the Transport Layer.

<p>False</p> Signup and view all the answers

DHCP is a protocol used for sending and receiving email messages between message transfer agents.

<p>False</p> Signup and view all the answers

FTP is used to handle streaming media on a network.

<p>False</p> Signup and view all the answers

RTP is primarily used to control multimedia communication using networks.

<p>True</p> Signup and view all the answers

IPSEC protocol is used for encrypting communication on a Virtual Private Network (VPN).

<p>True</p> Signup and view all the answers

The H.254-H.254 protocol is a common session layer communication protocol.

<p>False</p> Signup and view all the answers

In a bus topology, if the central node fails, the entire network will fail.

<p>False</p> Signup and view all the answers

Ring topology allows data to travel in only one direction.

<p>False</p> Signup and view all the answers

Mesh topology ensures that data packets are always transmitted through the most efficient route to reach the destination.

<p>False</p> Signup and view all the answers

Host-based architecture involves the server performing data storage, data access, processing logic, and user interface functions.

<p>True</p> Signup and view all the answers

The TCP Service File Transport Protocol (FTP) data/FTP command uses Port 20/22.

<p>False</p> Signup and view all the answers

UDP Service Simple Network Management Protocol (SNMP) uses Port 160.

<p>False</p> Signup and view all the answers

TCP/UDP Service Lightweight Directory Access Protocol (LDAP) uses Port 389.

<p>True</p> Signup and view all the answers

Transmission Control Protocol (TCP) allows multiple nodes to send data simultaneously in a ring topology.

<p>False</p> Signup and view all the answers

The Logical Link Control (LLC) sublayer in the OSI model is responsible for controlling physical transmission medium access.

<p>False</p> Signup and view all the answers

Mesh topology is not cost-effective for Managed Service Providers because it requires frequent addition of cables to expand the network.

<p>False</p> Signup and view all the answers

A TCP header includes fields for source port, destination port, length, and checksum.

<p>True</p> Signup and view all the answers

The OSI Model consists of the Physical layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, and Application Layer.

<p>True</p> Signup and view all the answers

Media converters are used to connect devices with compatible interfaces.

<p>False</p> Signup and view all the answers

A misconfigured IP address is considered a physical layer issue.

<p>False</p> Signup and view all the answers

The PDU associated with the network layer of the OSI model is a frame.

<p>False</p> Signup and view all the answers

HTTP responses consist of status code, response body, and checksum.

<p>False</p> Signup and view all the answers

ARPANET was known for its development of the Ethernet protocol.

<p>False</p> Signup and view all the answers

The TCP three-way handshake involves SYN, ACK, and FIN flags.

<p>False</p> Signup and view all the answers

If a computer attempts to ping a machine not on the local LAN without a default gateway set, the error message returned will be 'Request timed out.'

<p>False</p> Signup and view all the answers

The first half of a MAC address is known as the Unique Identifier Block (UIB).

<p>False</p> Signup and view all the answers

Network Address Translation (NAT) allows multiple devices inside a private network to share the same public IP address.

<p>True</p> Signup and view all the answers

MAC sublayer uses contention-based access method, where devices need permission to transmit data onto the medium.

<p>False</p> Signup and view all the answers

Logical Link Control (LLC) sublayer provides a consistent way for higher-layer protocols to access different types of network media based on their specific characteristics.

<p>False</p> Signup and view all the answers

Logical Link Control (LLC) sublayer assists in establishing, maintaining, and terminating logical links between nodes over the physical medium.

<p>True</p> Signup and view all the answers

Ethernet is an example of a MAC protocol.

<p>True</p> Signup and view all the answers

The 6 components of a structured wire system include core cabling, distribution frames, and antennae installation.

<p>False</p> Signup and view all the answers

Fiber distributed data interface (FDDI) networking relies on a star topology.

<p>False</p> Signup and view all the answers

Microwave radio connections require line-of-sight and are not affected by the Fresnel Zone.

<p>False</p> Signup and view all the answers

Patch panel is typically not involved in the initial cable connections within a networking closet.

<p>False</p> Signup and view all the answers

A computer network can only be small in scale, such as connecting a single building.

<p>False</p> Signup and view all the answers

Static routing is a dynamic routing technique that adapts to changing network parameters automatically.

<p>False</p> Signup and view all the answers

Encapsulation involves adding extra information to data as it moves through the network layers.

<p>True</p> Signup and view all the answers

An Ethernet broadcast frame is processed only by the device with the matching MAC address.

<p>False</p> Signup and view all the answers

A dynamic port is a fixed port number assigned permanently to a specific communication session.

<p>False</p> Signup and view all the answers

ARPANET was developed by the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) as the first public packet-switched computer network.

<p>True</p> Signup and view all the answers

HTTP was introduced in 1994 as a protocol for secure encrypted connections.

<p>False</p> Signup and view all the answers

Port density refers to the number of logical connections supported by a network device.

<p>False</p> Signup and view all the answers

Crossover cables are used to connect similar devices directly to each other.

<p>True</p> Signup and view all the answers

The TIA/EIA 568A and TIA/EIA 568B standards differ functionally beyond just the position of cable pairs on set pins.

<p>False</p> Signup and view all the answers

A patch panel simplifies network changes and troubleshooting by providing an unstructured interface for cable management.

<p>False</p> Signup and view all the answers

What is the main purpose of the ARP request sent by a device on the network?

<p>To request the MAC address associated with an IP address</p> Signup and view all the answers

Which command is used to display the current contents of the ARP cache in Windows?

<p>arp -a</p> Signup and view all the answers

What is the role of Wireshark's Promiscuous Mode?

<p>Captures all network packets passing through the interface</p> Signup and view all the answers

What information is stored in an ARP cache once resolved?

<p>MAC addresses mapped to IP addresses</p> Signup and view all the answers

In TCP/IP, what does ICMP stand for?

<p>Internet Control Message Protocol</p> Signup and view all the answers

Which Windows command is used to get the command line terminal interface?

<p>cmd</p> Signup and view all the answers

What is the purpose of an IDS (Intrusion Detection System) in a network?

<p>To capture and analyze network traffic for security incidents</p> Signup and view all the answers

In TCP, what are the three main phases that the protocol maintains?

<p>Connection setup, data transmission, connection termination</p> Signup and view all the answers

What is the term used to describe a group of 4 binary bits?

<p>Nibble</p> Signup and view all the answers

What message type is used in HTTP to signify that an image was successfully transferred to the client?

<p>Status code 200 (OK)</p> Signup and view all the answers

When a computer attempts to ping a machine not on the local LAN without a default gateway set, what error message is returned?

<p>&quot;Destination host unreachable&quot;</p> Signup and view all the answers

What is the main function of media converters in networking?

<p>To translate between different types of network technologies</p> Signup and view all the answers

What is the PDU associated with the network layer of the OSI model?

<p>Packet</p> Signup and view all the answers

What is responsible for making a connection with the source destination host while reliably sending packets over the network?

<p>TCP</p> Signup and view all the answers

Which protocol is suitable for real-time applications where speed is crucial but minor data loss is acceptable?

<p>User Datagram Protocol (UDP)</p> Signup and view all the answers

What is the purpose of a patch panel in a network?

<p>Connecting and organizing cables</p> Signup and view all the answers

What does TIA/EIA 568A and TIA/EIA 568B determine in networking?

<p>Order of wires in RJ45 connector</p> Signup and view all the answers

In the OSI model, where does encapsulation involve adding additional information to data?

<p>Physical layer</p> Signup and view all the answers

What is the key characteristic of an Ethernet broadcast frame?

<p>Has a destination MAC address FF-FF-FF-FF-FF-FF</p> Signup and view all the answers

Which network routing technique involves manual configuration and selection of routes?

<p>Static routing</p> Signup and view all the answers

What is the function of a dynamic port in networking?

<p>Allowing multiple simultaneous connections</p> Signup and view all the answers

'Port density' in network devices refers to what aspect?

<h1>of logical connections supported by a device</h1> Signup and view all the answers

'Hertz' is the unit of measurement for what in networking?

<h1>of bits transmitted per second</h1> Signup and view all the answers

'ARPANET' was developed by which entity as the first public packet-switched computer network?

<p>Advanced Research Projects Agency (ARPA)</p> Signup and view all the answers

In IP-based communication, what crucial information do packets contain?

<p>Source and destination information, and data content</p> Signup and view all the answers

What is the primary difference between switches and routers in network technology?

<p>Switches operate on the Data Link layer while routers operate on the Network layer</p> Signup and view all the answers

What is the key role of the Internet Protocol (IP) in an IP-based network?

<p>Routing packets to their destination based on IP addresses</p> Signup and view all the answers

What fundamental difference exists between the OSI Model and the TCP/IP model?

<p>Flexibility in function allocation across layers in TCP/IP model</p> Signup and view all the answers

What is the key distinction between Circuit-Switched and Packet-Switched communication?

<p>Dedicated communication path vs. independent packet routing</p> Signup and view all the answers

How do routers determine the next hop for data packets in a network?

<p>By using destination IP address from the packet header</p> Signup and view all the answers

What is a key drawback of host-based architecture?

<p>Not scalable</p> Signup and view all the answers

In client/server architecture, what type of computer performs all four functions that are accessed by the client computer?

<p>Mainframe computer</p> Signup and view all the answers

What is a significant drawback of client/server architecture in terms of performance?

<p>Tied performance to network bandwidth</p> Signup and view all the answers

What communication protocol is used for controlling multimedia communication using networks?

<p>RTP</p> Signup and view all the answers

Which session layer communication mode allows both ends of communication to communicate simultaneously?

<p>Full Duplex</p> Signup and view all the answers

What is a common benefit of Cloud computing/N-tier architecture?

<p>Scalability and easy component addition</p> Signup and view all the answers

Which layer of the OSI model is responsible for ensuring data is presented in a readable format and optionally encrypts application layer data?

<p>Presentation Layer</p> Signup and view all the answers

Which IEEE 802.3 standard uses copper twisted-pair cabling and allows for connections up to 25 meters long?

<p>IEEE 802.3 Standard 1000Base-CX</p> Signup and view all the answers

What encryption method does Secure Sockets Layer (SSL) use to encrypt connections between nodes?

<p>Asymmetric Encryption</p> Signup and view all the answers

What is the primary purpose of the L2TP protocol?

<p>Facilitating VPN usage</p> Signup and view all the answers

What connection-oriented protocol sets up a connection between the source and destination for message exchange during a conversation?

<p>H.254</p> Signup and view all the answers

Which of the following represents a difference between IPv4 and IPv6 addressing?

<p>Address Length</p> Signup and view all the answers

What is the primary role of the Transport Layer Security (TLS) protocol?

<p>Encrypting connections between nodes</p> Signup and view all the answers

'Upper layer protocols may need to define and maintain persistent connections.' This statement is most relevant to which layer of the OSI model?

<p>Transport Layer</p> Signup and view all the answers

What is the primary purpose of Network Address Translation (NAT) in a computer network?

<p>To conserve the number of public IP addresses in use</p> Signup and view all the answers

What is the responsibility of the MAC sublayer in a network?

<p>Dealing with issues like addressing and error checking</p> Signup and view all the answers

In a contention-based access method, what happens if multiple devices try to transmit data simultaneously?

<p>Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is used</p> Signup and view all the answers

What service does the Logical Link Control (LLC) sublayer provide in a computer network?

<p>Framing, flow control, and error checking</p> Signup and view all the answers

Which component of a structured wire system is responsible for connecting devices directly in a work environment?

<p>Work area</p> Signup and view all the answers

What is the main function of the Logical Link Control (LLC) sublayer protocol in a computer network?

<p>Providing a common interface for network and MAC layers</p> Signup and view all the answers

What does the MAC address represent in a computer network?

<p>A physical address given by the device manufacturer</p> Signup and view all the answers

What problem does Carrier Sense Multiple Access with Collision Detection (CSMA/CD) help solve in Ethernet networks?

<p>Avoiding collisions that occur when multiple devices transmit simultaneously.</p> Signup and view all the answers

In which network topology can data travel in either direction but must pass through each node until it reaches its destination?

<p>Ring</p> Signup and view all the answers

When a node needs to transmit a data packet to another node in a mesh network, what happens if the most efficient route is unknown?

<p>Data flooding occurs</p> Signup and view all the answers

Which port is associated with the Dynamic Host Configuration Protocol (DHCP)?

<p>Port 67/68</p> Signup and view all the answers

What is the primary function of a router in a network?

<p>Determining the best path for data packets</p> Signup and view all the answers

What is the main drawback of a bus topology when a cable fails?

<p>The network will die</p> Signup and view all the answers

'Hypertext Transfer Protocol Secure (HTTPS)' is associated with which port?

<p>Port 443</p> Signup and view all the answers

'NetBIOS session' uses which port for communication?

<p>Port 139</p> Signup and view all the answers

'Simple Mail Transfer Protocol (SMTP)' utilizes which port?

<p>Port 25</p> Signup and view all the answers

'Server Message Block (SMB) over IP' operates on which port?

<p>Port 445</p> Signup and view all the answers

Which layer of the OSI model is most visible because it interacts with software apps?

<p>Application layer</p> Signup and view all the answers

What is the purpose of port numbers in networking?

<p>Tell the server the type of service requested by the client</p> Signup and view all the answers

Which protocol provides secure email via X.509 certificates for authentication?

<p>S/MIME</p> Signup and view all the answers

What is the main function of a service listening on a port in networking?

<p>Providing a specific network service requested by a client</p> Signup and view all the answers

Which networking control uses antimalware programs to check apps for viruses?

<p>Malware Scanners</p> Signup and view all the answers

What does TIA/EIA 568A at one end and TIA/EIA 568B at the other end refer to?

<p>Crossover cable standard</p> Signup and view all the answers

Which backbone network design involves connecting departmental LANs to a centralized high-speed backbone using VLANs and Ethernet tagging?

<p>Flat Backbone Network</p> Signup and view all the answers

In a collapsed backbone network, what layers are merged into a single layer?

<p>Distribution and Core layers</p> Signup and view all the answers

What type of coaxial cable is commonly used for Closed Circuit Television (CCTV) transmission to monitors?

<p>RG-59/U</p> Signup and view all the answers

Which IEEE standard draws up to 15.4 watts of power from the PoE switch port to power certain IP phones?

<p>IEEE 802.3af-2003</p> Signup and view all the answers

Which method helps identify and prevent collisions in a network, thus improving overall efficiency?

<p>Collision Detection/Avoidance</p> Signup and view all the answers

What key benefit does Quality of Service (QoS) routing provide for real-time applications?

<p>Prioritizing time-sensitive traffic</p> Signup and view all the answers

'Hertz' is a unit of measurement for what in networking?

<p>Frequency</p> Signup and view all the answers

What type of transmission uses square waves and is measured as positive (1) or negative (0) voltage level?

<p>'Digital' transmission</p> Signup and view all the answers

'Reliability' in networking refers to the availability and integrity of what?

<p>'Data transmission'</p> Signup and view all the answers

Which type of malware is designed to disguise itself as a legitimate program to deceive users into downloading it?

<p>Trojan Horse</p> Signup and view all the answers

What transport layer service involves managing the pacing of data to avoid collisions and congestion?

<p>Flow Control</p> Signup and view all the answers

What type of network connection level connects workgroup LANs into department LANs in a hierarchical structure?

<p>Distribution Network</p> Signup and view all the answers

Which IPv6 addressing mode sends packets to the nearest node in a specified group of nodes?

<p>Anycast</p> Signup and view all the answers

What is the primary function of a malware scanner?

<p>Checking files for viruses</p> Signup and view all the answers

Which layer is responsible for the signaling of 1's and 0's in network communication?

<p>Physical Layer</p> Signup and view all the answers

What type of current is used in analog communications like AC appliances?

<p>Alternating Current (AC)</p> Signup and view all the answers

What is the primary difference between circuit-switched and packet-switched networks?

<p>Packet-switched networks break data into packets for transmission, while circuit-switched networks offer dedicated resources.</p> Signup and view all the answers

What does IPv6 provide that IPv4 lacks?

<p>IPv6 offers larger address space, while IPv4 provides more efficient routing.</p> Signup and view all the answers

What is the main function of the Media Access Control (MAC) sublayer in the Data Link Layer?

<p>Physical Addressing</p> Signup and view all the answers

In networking, what is the purpose of a crossover cable?

<p>To directly connect devices with different pin configurations</p> Signup and view all the answers

Which protocol is responsible for ensuring reliable delivery of data packets in the TCP/IP suite?

<p>Transmission Control Protocol (TCP)</p> Signup and view all the answers

What characteristic is essential for high-speed data transmission?

<p>Low Bit Error Rate</p> Signup and view all the answers

What does a patch cable with straight-through configuration enable?

<p>Connection between devices with similar pin configurations</p> Signup and view all the answers

What does the Logical Link Control (LLC) sublayer assist in?

<p>Establishing logical links between nodes over the physical medium</p> Signup and view all the answers

What is the primary function of the data link layer in networking?

<p>Handle network addressing and error detection</p> Signup and view all the answers

In networking, what is the purpose of a static route?

<p>Manually define specific routing paths</p> Signup and view all the answers

What is a possible consequence of a packet needing many hops to reach its destination in networking?

<p>Increased network congestion</p> Signup and view all the answers

What method does a switch use to forward frames with unknown destination MAC addresses in a LAN?

<p>Send the frames to all ports except the source port</p> Signup and view all the answers

What is one characteristic of cut-through switching in networking?

<p>Reduces latency by forwarding frames immediately</p> Signup and view all the answers

How do VLANs improve network efficiency in a physical network?

<p>Segment the network into isolated networks</p> Signup and view all the answers

What issue do Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP) aim to prevent in switching networks?

<p>Network loops</p> Signup and view all the answers

What is a drawback of Layer 2 switches creating flat network topologies?

<p>Increased broadcast frame distribution</p> Signup and view all the answers

What are LAN switches responsible for creating in a network?

<p>MAC address tables.</p> Signup and view all the answers

What is the primary function of a switch in a network?

<p>Make filtering and forwarding decisions based on the destination address</p> Signup and view all the answers

Which network device extends the reach of a network by overcoming attenuation?

<p>Repeater</p> Signup and view all the answers

What is the key feature of a structured wiring system for network infrastructure?

<p>Modular cabling solution for high-speed bandwidth and rapid changes</p> Signup and view all the answers

What is the primary purpose of the ARP broadcast query in a network?

<p>To discover the destination MAC address of a node</p> Signup and view all the answers

Which network technology allows multiple wavelengths of light to travel through a single fiber strand?

<p>Wavelength division multiplexing</p> Signup and view all the answers

In IPv6 networks, what protocol serves a function similar to ARP in IPv4 networks?

<p>Neighbor Discovery Protocol (NDP)</p> Signup and view all the answers

What is the primary purpose of an edge network in a network infrastructure?

<p>Support desktop workstation LAN connections</p> Signup and view all the answers

What does the Layer 3 network device use to make path decisions for IP packet forwarding?

<p>Source/destination IP addresses</p> Signup and view all the answers

Which type of LAN consists of users and devices located in the same part of a building?

<p>Workgroup LAN</p> Signup and view all the answers

What differentiates a metropolitan area backbone from a campus backbone network?

<p>Coverage area</p> Signup and view all the answers

What is characteristic of a collapse backbone network topology?

<p>Multiple access switches connected to high-capacity backbone switches</p> Signup and view all the answers

Which layer of the OSI model is responsible for breaking down data into packets for transmission?

<p>Transport layer</p> Signup and view all the answers

'Inter-building communication' is a key function of which type of network backbone?

<p>'Metropolitan area' Backbone</p> Signup and view all the answers

What is the main function of the Data Link layer in the OSI model?

<p>Ensuring reliable communication within LANs</p> Signup and view all the answers

'Providing high-speed connectivity' is a primary function associated with which type of backbone network?

<p>'Core' Backbone Network</p> Signup and view all the answers

What is the primary purpose of the Packet Switching technique?

<p>Breaking data into smaller packets for efficient transmission</p> Signup and view all the answers

'Supporting PCs and workstations to access network resources' is a key role of which type of network?

<p>'Access' Network</p> Signup and view all the answers

Which layer in the OSI model interacts directly with end users and network programs?

<p>Application Layer</p> Signup and view all the answers

What service does UDP provide that makes it ideal for broadcast or simple messages?

<p>Stateless, connectionless data transmission</p> Signup and view all the answers

Which networking protocol is responsible for defining the seven layers of a communication system?

<p>OSI</p> Signup and view all the answers

What is the purpose of the flow label in IPV6?

<p>Identifying packets belonging to the same flow or stream of data</p> Signup and view all the answers

What does the Traffic field in IPV6 represent?

<p>Packet priority and handling instructions</p> Signup and view all the answers

What is the main function of Address Resolution in networking?

<p>Mapping an IP address to a MAC address</p> Signup and view all the answers

What is the significance of Encapsulation in an IP network?

<p>Adding IP header information to packets</p> Signup and view all the answers

What does Port Address Translation (PAT) achieve in networking?

<p>Mapping multiple private IP addresses to a single public IP address</p> Signup and view all the answers

What does the Time to Live (TTL) value in an IP packet header represent?

<p>Maximum number of network hops before packet discard</p> Signup and view all the answers

'Connectionless protocol' refers primarily to which protocol?

<p>'Internet Control Message Protocol (ICMP)'</p> Signup and view all the answers

'Virtual Circuits' in networking are supported by which layer?

<p>Layer 3 - Network Layer</p> Signup and view all the answers

What is the primary advantage of using a loopback address?

<p>Ensuring proper functioning of the TCP/IP stack.</p> Signup and view all the answers

What does a classful network refer to in address architecture?

<p>Limitation of networks based on specific address classes.</p> Signup and view all the answers

What is the primary role of a NIC in a computer network?

<p>Enabling devices to connect to a network medium</p> Signup and view all the answers

In internetworking at the Data Link Layer, what is the function of a bridge?

<p>Learning MAC addresses for device communication</p> Signup and view all the answers

What is the purpose of a Network Layer address, such as an IP address?

<p>To route data packets through the network</p> Signup and view all the answers

What does a router primarily do in relation to IP packets in a network?

<p>Maintain IP routing tables for path determination</p> Signup and view all the answers

What distinguishes peer-to-peer internetworking from client/server architecture?

<p>Peer-to-peer does not depend on a central server for connections</p> Signup and view all the answers

At the Network Layer, what is the key function of routers?

<p>Building IP routing tables for path determination</p> Signup and view all the answers

What is a key advantage of using different ports for different protocols?

<p>Maintains individual connection separation</p> Signup and view all the answers

Which responsibility is NOT attributed to the transport layer of the TCP/IP model?

<p>Deciding on the route to transmit data</p> Signup and view all the answers

What is one advantage of Cut-Through Switching?

<p>Lower latency</p> Signup and view all the answers

In a structured wiring system, what is the purpose of an Intermediate Distribution Frame (IDF)?

<p>Connectivity to the data center facility</p> Signup and view all the answers

How do switches contribute to making an ethernet network faster?

<p>Isolating traffic between frequently communicating nodes</p> Signup and view all the answers

What must be addressed in the design of an end-to-end solution according to the text?

<p>Edge networks and building backbone networks</p> Signup and view all the answers

Which of the following is a characteristic of Store and Forward Switching?

<p>Higher latency for complete frame verification before forwarding</p> Signup and view all the answers

What role do VLANs play in network communication?

<p>'Isolate network traffic'</p> Signup and view all the answers

'Efficient resource utilization' is a key advantage of which network type?

<p>'Packet-Switched network'</p> Signup and view all the answers

'Campus or building backbone distribution' typically consists of which type of cabling?

<p>'Twisted-pair bundled cabling'</p> Signup and view all the answers

What is the primary function of Wireshark's Promiscuous Mode?

<p>To monitor all network traffic on the same network segment</p> Signup and view all the answers

How does a coaxial transmission medium differ from a glass/fiber transmission medium?

<p>Glass/fiber cables have multiple strands within the same sheath while coaxial cables do not</p> Signup and view all the answers

In TCP/IP Suite, what is the main responsibility of the Application layer protocols?

<p>Passing messages along with destination addresses to lower-layer protocols</p> Signup and view all the answers

How can air impact the transmission of 1's and 0's in a network?

<p>Moisture in the air can cause errors in data transmission</p> Signup and view all the answers

What does the choice between Layer 2 and Layer 3 switches depend on primarily?

<p>Network traffic and real-time application needs</p> Signup and view all the answers

Which component is crucial to consider when designing Ethernet networks for IP phones and powered devices?

<p>Capability for Power over Ethernet (PoE)</p> Signup and view all the answers

What is the primary purpose of incorporating ASIC, dual processors, and LAN switching in switch architecture?

<p>To improve network performance</p> Signup and view all the answers

In networking, what is the main responsibility of the physical layer in the OSI model?

<p>Managing electrical, mechanical, and functional aspects of data transfer</p> Signup and view all the answers

What distinguishes TCP/IP from OSI regarding network communication?

<p>'TCP/IP is a protocol suite for internet communications while OSI offers a network architecture framework'</p> Signup and view all the answers

What happens if two devices on an Ethernet LAN share the same MAC address?

<p>Network errors and collisions occur</p> Signup and view all the answers

Which protocol assists in ensuring transparency for upper layer protocols in the Internet Layer of TCP/IP?

<p>Internet Protocol Security (IPSec)</p> Signup and view all the answers

What is the main responsibility of the network access layer in TCP/IP related to data packets?

<p>Handles packets between nodes of the same LAN</p> Signup and view all the answers

How does IEEE 802.1Q Ethernet tagging contribute to network functionality?

<p>Facilitates VLAN extension across physical switches</p> Signup and view all the answers

What is a significant disadvantage of circuit-switched networks?

<p>Vulnerability to failure</p> Signup and view all the answers

What role does the destination perform in a packet-switched network?

<p>Packet reassembly and order management</p> Signup and view all the answers

How do workgroup LANs handle connectivity needs according to design considerations?

<p>Support various-sized switches for connectivity</p> Signup and view all the answers

Which layer of the TCP/IP model corresponds to the data link and physical layers of the OSI model?

<p>Network Access Layer</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser