Deck 1: Introduction to Networking
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 1: Introduction to Networking
1
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?
A) fail-open
B) fail-close
C) fail-tolerant
D) fail-dynamic
A) fail-open
B) fail-close
C) fail-tolerant
D) fail-dynamic
B
2
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
A) Application Layer
B) Presentation Layer
C) Session Layer
D) Transport Layer
A) Application Layer
B) Presentation Layer
C) Session Layer
D) Transport Layer
C
3
Static electricity is an electrical charge in motion.
False
4
The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?
A) Toxic Chemical Safety Procedure (TCSP)
B) Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
C) Environmental Chemical Hazard Sheet (ECHS)
D) Material Safety Data Sheet (MSDS)
A) Toxic Chemical Safety Procedure (TCSP)
B) Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
C) Environmental Chemical Hazard Sheet (ECHS)
D) Material Safety Data Sheet (MSDS)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is a defining characteristic of a bus topology based network?
A) Devices are connected to two adjacent devices, and communication priority is granted by a token.
B) Devices are connected directly to a centralized networking device, known as a network switch.
C) Devices are daisy-chained together in a single line.
D) Devices are directly attached to a network router, which forwards data to intended destinations.
A) Devices are connected to two adjacent devices, and communication priority is granted by a token.
B) Devices are connected directly to a centralized networking device, known as a network switch.
C) Devices are daisy-chained together in a single line.
D) Devices are directly attached to a network router, which forwards data to intended destinations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The Data Link layer attaches a trailer to the end of a packet, and does not include a header.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The protocol data unit for the Physical layer of the OSI model is payload, or data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
At what layer of the OSI model does a network switch normally operate?
A) Layer 2
B) Layer 3
C) Layer 4
D) Layer 5
A) Layer 2
B) Layer 3
C) Layer 4
D) Layer 5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?
A) fail-open
B) fail-close
C) fail-tolerant
D) fail-oriented
A) fail-open
B) fail-close
C) fail-tolerant
D) fail-oriented
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
A) Layer 4
B) Layer 5
C) Layer 6
D) Layer 7
A) Layer 4
B) Layer 5
C) Layer 6
D) Layer 7
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The Transport layer header addresses a receiving application by a number called a MAC address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What statement accurately reflects what occurs when a message is too large to transport on a network?
A) The message is discarded and must be sent again.
B) The message is sent anyway, and is received by the destination as garbage data.
C) The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
D) An ICMP error is generated, and the application must reformat the data for transmission.
A) The message is discarded and must be sent again.
B) The message is sent anyway, and is received by the destination as garbage data.
C) The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
D) An ICMP error is generated, and the application must reformat the data for transmission.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?
A) bus topology
B) star topology
C) star bus topology
D) mesh topology
A) bus topology
B) star topology
C) star bus topology
D) mesh topology
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The Data Link Layer utilizes what name for its protocol data unit (PDU)?
A) packet
B) data
C) bit
D) frame
A) packet
B) data
C) bit
D) frame
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What mail protocol is used to send mail messages to a server?
A) POP3
B) IMAP4
C) SMTP
D) HTTPS
A) POP3
B) IMAP4
C) SMTP
D) HTTPS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire?
A) fire extinction agent
B) fire suppression agent
C) extinguishing medium
D) eliminating factor
A) fire extinction agent
B) fire suppression agent
C) extinguishing medium
D) eliminating factor
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
In the TCP/IP model, what layer is considered so simple that it is ignored entirely?
A) Application
B) Network
C) Physical
D) Data Link
A) Application
B) Network
C) Physical
D) Data Link
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The TCP and UDP protocols both exist at what layer of the OSI model?
A) Application
B) Presentation
C) Transport
D) Network
A) Application
B) Presentation
C) Transport
D) Network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?
A) HTTP
B) POP3
C) SNMP
D) SMTP
A) HTTP
B) POP3
C) SNMP
D) SMTP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?
A) Application
B) Internet
C) Transport
D) Link
A) Application
B) Internet
C) Transport
D) Link
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What is the minimal amount of voltage required to damage an electrical component?
A) 5 volts
B) 10 volts
C) 100 volts
D) 1500 volts
A) 5 volts
B) 10 volts
C) 100 volts
D) 1500 volts
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What federal agency is charged with safety and health in the workplace?
A) Occupational Safety and Health Administration (OSHA)
B) Workplace Safety and Hazard Administration (WSHA)
C) Office Safety and Standards Department (OSSD)
D) Hazardous Materials and Safety Management (HMSM)
A) Occupational Safety and Health Administration (OSHA)
B) Workplace Safety and Hazard Administration (WSHA)
C) Office Safety and Standards Department (OSSD)
D) Hazardous Materials and Safety Management (HMSM)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors?
A) catastrophic failure
B) interrupting failure
C) upset failure
D) temporary failure
A) catastrophic failure
B) interrupting failure
C) upset failure
D) temporary failure
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What is the most popular web server application?
A) Microsoft Internet Information Services
B) NGINX
C) Lighttpd
D) Apache
A) Microsoft Internet Information Services
B) NGINX
C) Lighttpd
D) Apache
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
In the United States, who is able to activate the Emergency Alert System at the national level?
A) Any U.S. state or territory
B) The Federal Bureau of Investigation
C) The President
D) Local law enforcement
A) Any U.S. state or territory
B) The Federal Bureau of Investigation
C) The President
D) Local law enforcement
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?
A) File Transfer Protocol (FTP)
B) Secure Sockets Layer (SSL)
C) Secure Shell (SSH)
D) Remote Desktop Protocol (RDP)
A) File Transfer Protocol (FTP)
B) Secure Sockets Layer (SSL)
C) Secure Shell (SSH)
D) Remote Desktop Protocol (RDP)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
A) Application
B) Session
C) Transport
D) Network
A) Application
B) Session
C) Transport
D) Network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?
A) Active Directory Federated Users (AD FU)
B) Active Directory Domain Services (AD DS)
C) Automated Directory Network Services (AD NS)
D) Windows Named Resource Services (WN RS)
A) Active Directory Federated Users (AD FU)
B) Active Directory Domain Services (AD DS)
C) Automated Directory Network Services (AD NS)
D) Windows Named Resource Services (WN RS)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is not one of the disadvantages of peer-to-peer networks?
A) They lack scalability.
B) They are not necessarily secure.
C) They are impractical for connecting large numbers of computers.
D) They centralize user account logins.
A) They lack scalability.
B) They are not necessarily secure.
C) They are impractical for connecting large numbers of computers.
D) They centralize user account logins.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?
A) The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination.
B) The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed.
C) The packet will be dropped silently, requiring the communicating application try again.
D) The packet will be divided into smaller packets using fragmentation.
A) The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination.
B) The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed.
C) The packet will be dropped silently, requiring the communicating application try again.
D) The packet will be divided into smaller packets using fragmentation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?
A) MAC address
B) IP address
C) port address
D) autonomous system address
A) MAC address
B) IP address
C) port address
D) autonomous system address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?
A) MAC (Media Access Control) address
B) DAC (Data Access Control) address
C) DAC (Digital Access Control) address
D) PAC (Packet Access Control) address
A) MAC (Media Access Control) address
B) DAC (Data Access Control) address
C) DAC (Digital Access Control) address
D) PAC (Packet Access Control) address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is an example of encapsulation?
A) The addition of a header to data inherited from the layer above in the OSI model.
B) The subtraction of a header from data inherited from the layer below in the OSI model.
C) The modification of headers from a higher layer in the OSI model.
D) The addition of a trailer to data inherited from the layer above in the OSI model.
A) The addition of a header to data inherited from the layer above in the OSI model.
B) The subtraction of a header from data inherited from the layer below in the OSI model.
C) The modification of headers from a higher layer in the OSI model.
D) The addition of a trailer to data inherited from the layer above in the OSI model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?
A) The Presentation layer describes the interface between two applications, each on separate computers.
B) The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
C) The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
D) The Presentation layer is responsible for transporting Application layer payloads from one application to another.
A) The Presentation layer describes the interface between two applications, each on separate computers.
B) The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
C) The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
D) The Presentation layer is responsible for transporting Application layer payloads from one application to another.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are some of the typical elements that might be present in a fire suppression system, and what do they do?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What are some general OSHA guidelines to use when using power (electric) tools or other hand tools in the workplace?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the differences between the POP3 and IMAP4 protocols?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain the two different categories of Application layer protocols, and then detail the PDU used at this layer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain the differences between a physical topology and a logical topology.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe how the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) differ from each other, and provide examples of where each might be used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the difference between a WAN, MAN, CAN, and a PAN?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
How can you prevent damage to a component prior to touching it?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is a remote application, and how can remote applications be implemented on Windows Server?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are some of the tasks for which a network operating system is responsible?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck