• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back

Which one of the following protocols are examples of TCP/IP transport protocols?




A. Ethernet


B. HTTP


C. IP


D. UDP


E. SMTP

D. UDP

Which of the following protocols is an example of a TCP/IP data link layer protocol?




A. Ethernet


B. HTTP


C. IP


D. TCP

A. Ethernet

The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what?




A. Same layer interaction


B. Adjacent layer interaction


C. OSI model


D. All of these answers are correct

B. Adjacent layer interaction

What does the term 'DDN' mean?




A. Dynamic Digital Network


B. Digital Dynamic Network


C. Dotted Decimal Notation


D. Deliver Data Now

C. Dotted Decimal Notation

The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data link header and trailer is an example of what?




A. Data encapsulation


B. Same layer interaction


C. OSI model


D. All of the above

A. Data encapsulation

Using the Physical layer of the OSI model, what would expect to find?




A. Yahoo email


B. Google gmail


C. Youtube


D. LAN repeater

D. LAN repeater

Which OSI layer defines the functions of logical network-wide addressing and routing?



A. Layer 1


B. Layer 2


C. Layer 3


D. Layer 4


E. Layer 5, 6, or 7

C. Layer 3 or Network Layer

Which OSI layer defines the standards for cabling and connectors?




A. Layer 1


B. Layer 2


C. Layer 3


D. Layer 4


E. Layer 5, 6, or 7

A. Layer 1 or Physical Layer

Which one of the following terms are not valid terms for the names of the seven OSI layers?




A. Application


B. Data Link


C. Transmission


D. Presentation

C. Transmission

Which layer defines how to start, control, and end conversations?




A. Application


B. Network


C. Session


D. Presentation

C. Session

In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology and no cable. Which of the following is true regarding the use of Ethernet in this LAN?




A. Only the devices that use cables are using Ethernet.


B. Only the devices that use wireless are using Ethernet.


C. Both the devices using cables and those using wireless are using Ethernet.


D. None of the devices are using Ethernet.

A. Only the devices that use cables are using Ethernet.

Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling?




A. 10GBASE-T


B. 100BASE-T


C. 1000BASE-T


D. None of these answers are correct.

C. 1000BASE-T

Which of the following is true about Ethernet crossover cables for Fast Ethernet?




A. Pins 1 and 2 are reversed on the other end of the cable.


B. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable.


C. Pins 1 and 2 on one end of the cable connect to 3 and 4 on the other end of the cable.


D. The cable can be up to 1000 meters long to cross over between buildings.


E. None of the answers are correct.

B. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable.

Which of the following is true about the CSMA/CD algorithm?




A. The algorithm never allows collisions to occur.


B. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover.


C. The algorithm works with only two devices on the same Ethernet.


D. None of these answers are correct.

B. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover.

Which of the following is true about the Ethernet FCS field?




A. Ethernet uses FCS for error recovery.


B. It is 2 bytes long.


C. It resides in the Ethernet trailer, not the Ethernet header.


D. It is used for encryption.

C. It resides in the Ethernet trailer, not the Ethernet header.

What does the term 'MAC' refer to?




A. Many Accessible Channels


B. Media Access Control


C. Mouse Access Click


D. Microsoft And Cisco (A collaboration of the two companies.)

B. Media Access Control

Which of these is NOT correct?




A. Start frame Delimiter is 7 bytes.


B. Destination MAC Address is 6 bytes.


C. Source MAC Address is 4 bytes.


D. All are correct.

C. Source MAC Address is 4 bytes.

What is the books' definition of an Ethernet LAN?




A. Some electronic devices connected together by wires using connectors.


B. Some electronic devices connected together by string.


C. It is a combination of user devices, LAN switches, and different kinds of cabling.


D. Two or more computers and printers connected either by Cat 5 and/or wirelessly to a router.

C. It is a combination of user devices, LAN switches, and different kinds of cabling.

What does the term 'SFP' mean?




A. Simple Firewall Programming


B. Silicon Fiber Powered


C. Small Form-Factor Pluggables


D. None of the above.

C. Small Form-Factor Pluggables

What does the term 'OUI' mean?




A. Original Uniform Industry-Standard


B. Only Utilize Industry-Standard


C. Organizationally Unique Identifier


D. Organization Under Investigation

C. Organizationally Unique Identifier

What does the term 'Flag' mean in the book?




A. You wave one to be patriotic.


B. The end of a race.


C. Lists a recognizable bit pattern so that the receiving nodes realize that a new frame is arriving.


D. The optional screen saver on your computer.

C. Lists a recognizable bit pattern so that the receiving nodes realize that a new frame is arriving.

In the cabling for a leased line, which of the following typically connects to a four-wire line provided by a telco?




A. Router serial interface without terminal CSU/DSU?


B. CSU/DSU


C. Router serial interface with internal transceiver.


D. Switch serial interface.

B. CSU/DSU

What does the term 'CPE' mean?




A. Cisco Property Equipment


B. Cisco Programmable Equipment


C. Customer Premises Equipment


D. None of the above.

C. Customer Premises Equipment

Which of the following fields in the HDLC header used by Cisco routers does Cisco add, beyond the ISO Standard HDLC?




A. Flag


B. Type


C. Address


D. FCS

B. Type

What does the term 'MPLS' mean?




A. Many People Linked Securely


B. Multi Point LAN Switch


C. Multiprotocol Label Switching


D. Main Protocol Link Switch

C. Multiprotocol Label Switching

Which of the following Internet access technologies, used to connect a site to an ISP, offers asymmetric speeds?




A. Leased lines.


B. Carrier pigeons


C. DSL


D. Morse Code

C. DSL

Which of the following is NOT correct?




A. Address - Identifies the destination device


B. Control - Identifies the Layer 4 packet encapsulated inside the frame.


C. FCS - A field used by the error detection process; it is the only trailer field in this table.


D. All are correct.

B. Control - Identifies the Layer 4 packet

Of the choices and their maximum lengths, which one is correct?




A. 1000BASE-XL - 5km


B. 1000BASE-LX - 5km


C. 1000BASE-XL - 10km


D. 1000BASE-LX - 10km

B. 1000BASE-LX - 5km

Of the choices and their maximum lengths, which one is correct?


A. 1000BASE-ZX - 7km


B. 1000BASE-XZ - 7km


C. 1000BASE-ZX - 70km


D. 1000BASE-XZ - 70km

C. 1000BASE-ZX - 70km

What does the term 'PSTN' mean?




A. Peer Switch T1 Network


B. Programmable Switch Telco Network


C. Public Switched Telephone Network


D. Private Switched Telephone Network

C. Public Switched Telephone Network

In a class B address, how many possible networks are there?




A. 16,752


B. 16,356


C. 16,384


D. None of the above

C. 16,384

Which one is NOT a goal of routing protocols?




A. To statically learn and fill the routing table with a route to each subnet in the internetwork


B. If more than one route to a subnet is available, to place the best route in the routing table.


C. To work quickly when adding new routes or replacing lost routes.


D. To prevent routing loops.

B. If more than one route to a subnet is available, to place the best route in the routing table.

What is the assignable range of values for the first octet for Class A IP networks?




A. 0 to 127


B. 0 to 126


C. 1 to 127


D. 1 to 126

D. 1 to 126

Which is a valid network number for a Class A address?


A. 128.0.0.0 to 191.255.0.0


B. 127.0.0.0


C. 1.0.0.0 to 126.0.0.0


D. None of the above

C. 1.0.0.0 to 126.0.0.0

Which is a valid network number for a Class B address?


A. 127.0.0.0


B. 193.0.0.0


C. 128.0.0.0 to 191.255.0.0

C. 128.0.0.0 to 191.255.0.0

What does the term 'DNS' mean?


A. Direct Network System


B. Dynamic Network System


C. Domain Name System


D. Disc Not Scanned

C. Domain Name System

IP defines network layer addresses that identify any host or router interface that connects to a TCP/IP network.




T/F

True

IP addresses consist of a 34 bit number, usually written in dotted decimal notation.




T/F

False

Each DDN is written using 6 octets, each of which is using 8 bits.




T/F

False

Class C has a total of 2,097, 152 networks, and 260 hosts per network?




T/F

False

The application FTP data utilizes:




A. Port 22


B. Port 25


C. Port 110


D. Port 20

D. Port 20

The application SSH utilizes:




A. Port 21


B. Port 22


C. Port 80


D. Port 10

B. Port 22

The application POP3 utilizes:




A. Port 100


B. Port 200


C. Port 110


D. Port 210

C. Port 110

The volume of bits per second needed for the application to work well.




A. Delay


B. Jitter


C. Bandwidth


D. Loss

C. Bandwidth

In the URL, the protocol is listed ____ the //.




A. After


B. Instead of


C. before


D. The protocol is not listed at all

C. before

In the URL, the host name is listed between:




A. / and /


B. // and //


C. / and //


D. // and /

D. // and /

When you type in a web address, this is also called a?




A. Port


B. Octet


C. URL


D. None of the above

C. URL

Flow control using windowing is?




A. Process used to initialize port numbers and sequence and Acknowledgment fields.


B. Using Microsoft software.


C. Process that uses window sizes to protect buffer space and routing devices from being overloaded with traffic.


D. None of the above.

C. Process that uses window sizes to protect buffer space and routing devices from being overloaded with traffic.

The OSI transport layer (Layer 4) defines several functions, the most important of which are error recovery and flow control.




T/F

True

The key difference between TCP and UDP is that UDP provides a wide variety of services to applications, whereas TCP does not.




T/F

False