Deck 1: Introduction to Networking

ملء الشاشة (f)
exit full mode
سؤال
If a Network layer protocol is aware that a packet is larger than the maximum size for its network,it will divide the packet into smaller packets in a process known as:

A)de-encapsulation
B)fragmentation
C)packet splitting
D)framing
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
HTTP,IMAP4,FTP,and Telnet are all examples of protocols that operate at what layer of the OSI model?

A)Layer 4
B)Layer 5
C)Layer 6
D)Layer 7
سؤال
A standard network switch operates at what layer of the OSI model?

A)Layer 5
B)Layer 2
C)Layer 3
D)Layer 7
سؤال
At what layer of the OSI model do the IP,ICMP,and ARP protocols operate?

A)Application
B)Session
C)Transport
D)Network
سؤال
The fundamental difference between a switch and a router is that a switch belongs only to itslocal network and a router belongs to two or more local networks.
سؤال
The segment or datagram protocol data unit exists at what layer of the OSI model?

A)Application layer
B)Transport layer
C)Network layer
D)Data link layer
سؤال
In what network topology are devices daisy-chained together in a single line?

A)bus topology
B)star topology
C)star bus topology
D)ring topology
سؤال
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

A)fail-open
B)fail-close
C)fail-tolerant
D)fail-dynamic
سؤال
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

A)Application Layer
B)Presentation Layer
C)Session Layer
D)Transport Layer
سؤال
Which of the following is not one of the disadvantages of peer-to-peer networks?

A)They lack scalability
B)They are not necessarily secure
C)They are impractical for connecting large numbers of computers
D)They centralize user account logins
سؤال
Servers that have a NOS installed require less memory,processing power,and storage capacity that clients because servers are called on to handle only light processing loads and requests from multiple clients.
سؤال
The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below?

A)demarc
B)last mile
C)local loop
D)point of no return
سؤال
After a problem and its symptoms have been identified,a theory regarding a probable cause should be established.
سؤال
What is the name for the protocol data unit (PDU)of the Data Link layer?

A)packet
B)data
C)bit
D)frame
سؤال
Using the same network to deliver multiple types of communications services,such as video,voice,and fax,is known as:

A)multi-faceted networking
B)convergence
C)multiplexing
D)unified networking
سؤال
Select the layer of the OSI model that is responsible for reformatting,compressing,and/or encrypting data in a way that the application on the receiving end can read:

A)Application
B)Presentation
C)Session
D)Transport
سؤال
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

A)Toxic Chemical Safety Procedure (TCSP)
B)Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
C)Environmental Chemical Hazard Sheet (ECHS)
D)Material Safety Data Sheet (MSDS)
سؤال
Static electricity is an electrical charge in motion.
سؤال
What physical network topology consists of all connected devices connecting to one central device,such as a switch?

A)bus topology
B)ring topology
C)hub topology
D)star topology
سؤال
The protocol data unit for the Physical layer of the OSI model is payload,or data.
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
System default that allows access during a systemor network failure.
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
The transfer of electricalcharge between two bodies,such as when a techniciantouches a computer component.
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
The point of division between atelecommunications service carrier's network and a building'sinternal network.
سؤال
Any computer or device on a network that can be addressed on the local network is referred to as a:

A)host
B)node
C)target
D)subject
سؤال
Voice and video transmissions are _______________,meaning you don't want to hear breaks in your conversation or see a buffering message when you watch a movie over the Internet.
سؤال
When using a Windows domain,what is the domain-level account for each user known as?

A)global account
B)universal account
C)domain token
D)principle name
سؤال
The process of adding a header to the data inherited from the layer above is called what option below?

A)segmenting
B)encapsulation
C)fragmenting
D)appending
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
The use of data networks to carry voice,video,and other communications services in addition to data.
سؤال
The smallest network is a ______________________,which is a network of personal devices,such as the network you use when you sync your cell phone and your computer.
سؤال
Which two protocols can be used to gain remote access specifically to a server's command line interface,securely and unsecurely?

A)Telnet
B)SSH
C)Remote Desktop
D)VNC
سؤال
What mail protocol is used to send mail messages to a server?

A)POP3
B)IMAP4
C)SMTP
D)HTTPS
سؤال
What two encryption protocols are commonly used with the Hypertext Transfer Protocol?

A)SSH
B)TLS
C)SSL
D)AES
سؤال
___________ is an unsecured client server application / protocol that transfers files between two computers.
سؤال
What is the name for a client-server model with one server and many clients,such as when an application is used to watch a live sports event?

A)multicast distribution
B)multi-point communication
C)spread packet delivery
D)broadcast transmission
سؤال
The centralized directory database that contains user account information and security for the entire group of computers in a Windows domain is called _________________.
سؤال
The Network layer header identifies sending and receiving hosts by their _________________.
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
(1)A unit of data that results from subdividing alarger protocol data unit.(2)A part of a network.Usually,asegment is composed of a group of nodes that share the samecommunications channel for all their traffic.
سؤال
Static electricity can cause what two types of damage in electronic components?

A)electromagnetic failure
B)catastrophic failure
C)upset failure
D)polarity failure
سؤال
What two mail delivery protocols below can be used by a client application to receive e-mail from a server?

A)POP3
B)SMTP
C)MGET
D)IMAP4
سؤال
What are the two main Transport Layer protocols?

A)IPX
B)SPX
C)TCP
D)UDP
سؤال
Describe how the Transmission Control Protocol (TCP)and User Datagram Protocol (UDP)differ from each other,and provide examples of where each might be used.
سؤال
Explain the differences between a physical topology and a logical topology.
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
System default that denies access during a systemor network failure.
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
Damage that can shorten the life of a componentand/or cause intermittent errors.
سؤال
How can you prevent damage to a component prior to touching it?
سؤال
Explain the two different categories of Application layer protocols,and then detail the PDU used at this layer.
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
(1)The amount of traffic,or data transmissionactivity,on a network.(2)A measure of the differencebetween the highest and lowest frequencies that a mediumcan transmit.
سؤال
What are some general OSHA guidelines to use when using power (electric)tools or other hand tools in the workplace?
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
A user's domain-level account,also called aglobal username or network ID,which is assigned by thenetwork administrator and is kept in Active Directory.
سؤال
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
Data that is passed between applications or utilityprograms and the operating system,and includes controlinformation.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to Networking
1
If a Network layer protocol is aware that a packet is larger than the maximum size for its network,it will divide the packet into smaller packets in a process known as:

A)de-encapsulation
B)fragmentation
C)packet splitting
D)framing
B
2
HTTP,IMAP4,FTP,and Telnet are all examples of protocols that operate at what layer of the OSI model?

A)Layer 4
B)Layer 5
C)Layer 6
D)Layer 7
D
3
A standard network switch operates at what layer of the OSI model?

A)Layer 5
B)Layer 2
C)Layer 3
D)Layer 7
B
4
At what layer of the OSI model do the IP,ICMP,and ARP protocols operate?

A)Application
B)Session
C)Transport
D)Network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
The fundamental difference between a switch and a router is that a switch belongs only to itslocal network and a router belongs to two or more local networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
The segment or datagram protocol data unit exists at what layer of the OSI model?

A)Application layer
B)Transport layer
C)Network layer
D)Data link layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
In what network topology are devices daisy-chained together in a single line?

A)bus topology
B)star topology
C)star bus topology
D)ring topology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

A)fail-open
B)fail-close
C)fail-tolerant
D)fail-dynamic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

A)Application Layer
B)Presentation Layer
C)Session Layer
D)Transport Layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is not one of the disadvantages of peer-to-peer networks?

A)They lack scalability
B)They are not necessarily secure
C)They are impractical for connecting large numbers of computers
D)They centralize user account logins
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Servers that have a NOS installed require less memory,processing power,and storage capacity that clients because servers are called on to handle only light processing loads and requests from multiple clients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below?

A)demarc
B)last mile
C)local loop
D)point of no return
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
After a problem and its symptoms have been identified,a theory regarding a probable cause should be established.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
What is the name for the protocol data unit (PDU)of the Data Link layer?

A)packet
B)data
C)bit
D)frame
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Using the same network to deliver multiple types of communications services,such as video,voice,and fax,is known as:

A)multi-faceted networking
B)convergence
C)multiplexing
D)unified networking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Select the layer of the OSI model that is responsible for reformatting,compressing,and/or encrypting data in a way that the application on the receiving end can read:

A)Application
B)Presentation
C)Session
D)Transport
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

A)Toxic Chemical Safety Procedure (TCSP)
B)Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
C)Environmental Chemical Hazard Sheet (ECHS)
D)Material Safety Data Sheet (MSDS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Static electricity is an electrical charge in motion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What physical network topology consists of all connected devices connecting to one central device,such as a switch?

A)bus topology
B)ring topology
C)hub topology
D)star topology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
The protocol data unit for the Physical layer of the OSI model is payload,or data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
System default that allows access during a systemor network failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
The transfer of electricalcharge between two bodies,such as when a techniciantouches a computer component.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
The point of division between atelecommunications service carrier's network and a building'sinternal network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Any computer or device on a network that can be addressed on the local network is referred to as a:

A)host
B)node
C)target
D)subject
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Voice and video transmissions are _______________,meaning you don't want to hear breaks in your conversation or see a buffering message when you watch a movie over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
When using a Windows domain,what is the domain-level account for each user known as?

A)global account
B)universal account
C)domain token
D)principle name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
The process of adding a header to the data inherited from the layer above is called what option below?

A)segmenting
B)encapsulation
C)fragmenting
D)appending
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
The use of data networks to carry voice,video,and other communications services in addition to data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
The smallest network is a ______________________,which is a network of personal devices,such as the network you use when you sync your cell phone and your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which two protocols can be used to gain remote access specifically to a server's command line interface,securely and unsecurely?

A)Telnet
B)SSH
C)Remote Desktop
D)VNC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
What mail protocol is used to send mail messages to a server?

A)POP3
B)IMAP4
C)SMTP
D)HTTPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What two encryption protocols are commonly used with the Hypertext Transfer Protocol?

A)SSH
B)TLS
C)SSL
D)AES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
___________ is an unsecured client server application / protocol that transfers files between two computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
What is the name for a client-server model with one server and many clients,such as when an application is used to watch a live sports event?

A)multicast distribution
B)multi-point communication
C)spread packet delivery
D)broadcast transmission
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The centralized directory database that contains user account information and security for the entire group of computers in a Windows domain is called _________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The Network layer header identifies sending and receiving hosts by their _________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
(1)A unit of data that results from subdividing alarger protocol data unit.(2)A part of a network.Usually,asegment is composed of a group of nodes that share the samecommunications channel for all their traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Static electricity can cause what two types of damage in electronic components?

A)electromagnetic failure
B)catastrophic failure
C)upset failure
D)polarity failure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What two mail delivery protocols below can be used by a client application to receive e-mail from a server?

A)POP3
B)SMTP
C)MGET
D)IMAP4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the two main Transport Layer protocols?

A)IPX
B)SPX
C)TCP
D)UDP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe how the Transmission Control Protocol (TCP)and User Datagram Protocol (UDP)differ from each other,and provide examples of where each might be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Explain the differences between a physical topology and a logical topology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
System default that denies access during a systemor network failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
Damage that can shorten the life of a componentand/or cause intermittent errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
How can you prevent damage to a component prior to touching it?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Explain the two different categories of Application layer protocols,and then detail the PDU used at this layer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
(1)The amount of traffic,or data transmissionactivity,on a network.(2)A measure of the differencebetween the highest and lowest frequencies that a mediumcan transmit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What are some general OSHA guidelines to use when using power (electric)tools or other hand tools in the workplace?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
A user's domain-level account,also called aglobal username or network ID,which is assigned by thenetwork administrator and is kept in Active Directory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Matching
Match each correct item with the statement below.
a.bandwidth
b.convergence
c.demarcation point
d.electrostatic discharge (ESD)
e.fail close
f.fail open
g.global account
h.payload
i.segment
j.upset failure
Data that is passed between applications or utilityprograms and the operating system,and includes controlinformation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.