TestOut Network Pro Midterm – Flashcards

Unlock all answers in this set

Unlock answers
question
Which network component connects a device with the transmission media and allows it to send and receive messages? Client Network interface card Peripheral Protocol Server
answer
Network Interface card The network interface card (NIC) allows a device to send and receive messages over the transmission media.
question
What device sends signals from a computer onto a network? Transceiver Cable Gateway Router
answer
Transceiver A transceiver (short for transmitter/receiver) sends signals to and receives signals from the network. It translates the parallel data stream of the computer to the serial data stream of the network and vice versa. Most transceivers are now built into network interface cards (NICs).
question
Which of the following statements accurately describes how a modem works? (Select two)
answer
It modulates digital data from the PC into analog data and transmits it on a telephone network. It demodulates analog data from a telephone network into digital PC data. Modem is shorthand for modulator/demodulator. Its job is to convert (or modulate) digital data from a PC into analog telephone signals and transmit them through a telephone network.
question
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use? Repeater Hub Bridge Media converter Gateway
answer
Media converter Use a media converter to convert from one media type to another media type within the same architecture. Use a bridge to connect two devices that use different network architectures, for example to connect a wired network to wireless clients. A hub or a repeater connect devices using the same media type.
question
At which OSI model layer does a media converter operate?
answer
Layer 1 A media converter operates at the OSI model layer 1 (Physical layer). The media converter translates frames into bits and transmits them on the transmission medium. At layer 2, the MAC address is added to make the data into a frame. At layer 3, the IP address is added to the packet. A media converter does not alter or use the MAC address or the IP address.
question
What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two) OC-x SFP MPLS GBIC
answer
SFP GBIC Older network adapters used an external transceiver that matched the media type. While nearly all current network adapters come with a built-in transceiver type, new devices, such as switches and routers, use transceiver modules that allow you to modify the media type of a port by changing the transceiver. Transceiver modules include the following: GBIC (gigabit interface converter) is a larger-sized transceiver that fits in a port slot and is used for Gigabit media including copper and fiber optic. SFP (small form-factor pluggable) is similar to a GBIC but with a smaller size. An SFP is sometimes called a mini-GBIC XFP transceiver is similar in size to an SFP but is used for 10 Gigabit networking.
question
Which of the following is a valid MAC address? 34-9A-86-1G-B3-24 83-5A-5B-0B-31-55-F1 255.255.255.0 C0-34-FF-15-01-8E 73-99-12-61-15 192-168-12-15
answer
C0-34-FF-15-01-8E A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC address has a total of 12 hexadecimal numbers. Hexadecimal numbers contain the numbers 0 to 9 and letters A to F. Valid values in a MAC address range anywhere from 00 to FF. Note that one of the answers would be valid MAC address except it uses a G value, which is beyond the range of a hexadecimal number.
question
Which of the following is a valid MAC address? 95ABC2F4.ABC5.569D.43BF FABC.875E.9BG6 AB.07.CF.62.16.BD 145.65.254.10
answer
AB.07.CF.62.16.BD MAC addresses are comprised of 12 hexadecimal digits (ranging from 0-9 and A-F). They are typically represented as a three sets of four hexadecimal digits or six sets of two hexadecimal digits separated with periods. Regardless of the grouping and separator values, look for 12 hex digits for a valid MAC address.
question
Which of the following is true about the MAC address? (Select two) It is typically represented by octets of decimal numbers between 0-255 It is typically represented by hexadecimal numbers. It is a 64-bit address It is a 48-bit address It is a 32-bit address
answer
It is typically represented by hexadecimal numbers. It is a 48-bit address The MAC address identifies the physical address of the network adapter. The MAC address is a 12-digit (48-bit) hexadecimal number (each number ranges from 0-9 or A-F). The address is often written as 00-B0-D0-06-BC-AC OR 00B0.D006.BCAC, although dashes, periods, and colons can be used to divide the MAC address parts. An IPv4 address is 32-bits and uses octets of decimal numbers between 0-255. An IPv6 address is a 64-bit address that uses 32 hexadecimal numbers.
question
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? BOOTP ARP DNS DHCP IGMP ICMP
answer
ARP Hosts use the Address Resolution Protocol (ARP) to discover the hardware address of a host.
question
Which of the following best describes how a switch functions?
answer
It connects multiple cable segments (or devices), and forwards frames to the appropriate segment. Switches have multiple ports and can connect multiple segments or devices. The switch forwards frames to the appropriate port. They function similarly to a hub, except instead of sending packets to all ports, switches send packets only to the destination computer's port.
question
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? (Select two) Router Switch Repeater Bridge Gateway Hub
answer
Repeater Hub A hub and a repeater send received signals out all other ports. These devices do not examine the frame or the packet contents. A switch or a bridge use the MAC address in a frame for forwarding decisions. A router uses the IP address in a packet for forwarding decisions.
question
How do switches and bridges learn where devices are located on a network?
answer
When a frame enters a port, the source MAC address is copied from the frame header. Bridges and switches learn addresses by copying the MAC address of the source device and placing it into the MAC address table. The port number which the frame entered is also recorded in the table and associated with the source MAC address. The switch or the bridge cannot record the destination MAC address because it does not know the port that is used to reach the destination device. Bridges and switches operate at Layer 2 and do not use IP address (which exist at Layer 3).
question
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?
answer
Send the frame out ports 2-8 Because the switch does not know the port that is used to reach the destination device, it will send the frame out all ports except for the port on which the frame was received. After the switch learns the port that is used to reach the destination device, it will send the frame out only that port.
question
Which of the following devices does not segment the network? Firewall Router Hub Switch
answer
Hub A hub does not create multiple segments on the network. A segment is a portion of the network that has different media, collision domains, or broadcast domains. A hub simply connects devices using the same media type. All devices are members of the same collision and broadcast domains. On a switch, each switch port is in a separate collision domain. With a router or a firewall, each connected network is a different broadcast domain.
question
Which of the following hardware devices links multiple networks and directs traffic between networks? Router Repeater Hub Bridge
answer
Router A router is a device that links multiple networks and directs traffic between networks. Each network linked by routers has its own unique identifier called the "network number" or "network address."
question
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the Internet to provide users with Internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the Internet on three separate occasions. Router Switch Hub CSU/DSU Proxy server Firewall
answer
Firewall The role of a firewall is to provide a barrier between an organization's network and a public network, such as the Internet. Its job is to prevent unauthorized access into the organization's private network. To do this, the firewall examines incoming packets and determines whether they should be allowed to enter based on a set of rules defined by the network administrator.
question
Which of the following is the best device to deploy to protect your private network from a public untrusted network? Gateway Hub Firewall Router
answer
Firewall A firewall is the best device to deploy to protect your private network from a public untrusted network. Firewalls are used to control traffic entering and leaving your trusted network environment. Firewalls can manage traffic based on source or destination IP address, port number, service protocol, application or service type, user account, and even traffic content. Routers offer some packet-based access control, but not as extensive as that of a full-fledged firewall. Hubs and gateways are not sufficient for managing the interface between a trusted and an untrusted network.
question
Which of the following is a good reason to install a firewall?
answer
To prevent hackers from accessing your network. Firewalls prevent unauthorized users from accessing private networks connected to the internet. You should never allow public access to your DHCP server. A proxy server caches web pages. A NAT router or ICS translates Web addresses to private IP addresses. A proxy server and NAT software might be implemented on the same device as your firewall, but they are different concepts.
question
You are the administrator of your company's network. You want to prevent unauthorized access to your intranet from the Internet. Which of the following should you implement? Firewall ICS Packet Internet Groper Proxy server
answer
Firewall A firewall allows you to filter unwanted traffic from the Internet to your network. Packet Internet Groper is better known by its acronym, PING, a TCP/IP command. A proxy server caches web pages. ICS allows you to connect a small network to the Internet through a single connection.
question
If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as:
answer
fragmentation
question
The segment or datagram protocol data unit exists at what layer of the OSI model?
answer
​Transport layer
question
What is the name for the protocol data unit (PDU) ​of the Data Link layer?
answer
​frame
question
The point of division between a telecommunications service carrier's network and a building's internal network.
answer
​demarcation point
question
​The use of data networks to carry voice, video, and other communications services in addition to data.
answer
convergence​
question
​(1) A unit of data that results from subdividing a larger protocol data unit. (2) A part of a network. Usually, a segment is composed of a group of nodes that share the same communications channel for all their traffic.
answer
​segment
question
System default that allows access during a system or network failure.
answer
fail open
question
The transfer of electrical charge between two bodies, such as when a technician touches a computer component.
answer
electrostatic discharge (ESD)
question
​A user's domain-level account, also called a global username or network ID, which is assigned by the network administrator and is kept in Active Directory.
answer
​global account
question
(1) The amount of traffic, or data transmission activity, on a network. (2) A measure of the difference between the highest and lowest frequencies that a medium can transmit.
answer
bandwidth
question
​Damage that can shorten the life of a component and/or cause intermittent errors.
answer
upset failure
question
System default that denies access during a system or network failure.​
answer
fail close
question
​Data that is passed between applications or utility programs and the operating system, and includes control information.
answer
Payload
question
Which of the following is not one of the disadvantages of peer-to-peer networks?
answer
They centralize user account logins
question
Any computer or device on a network that can be addressed on the local network is referred to as a:
answer
​node
question
In what network topology are devices daisy-chained together in a single line?​
answer
​bus topology
question
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
answer
​Layer 7
question
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?​
answer
​Session Layer
question
The process of adding a header to the data inherited from the layer above is called what option below?
answer
​encapsulation
question
What mail protocol is used to send mail messages to a server?
answer
​SMTP
question
What physical network topology consists of all connected devices connecting to one central device, such as a switch?
answer
​star topology
question
When using a Windows domain, what is the domain-level account for each user known as?​
answer
global account
question
Servers that have a NOS installed require less memory, processing power, and storage capacity that clients because servers are called on to handle only light processing loads and requests from multiple clients.​
answer
False
question
The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.
answer
True
question
The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below?
answer
​demarc
question
After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.
answer
True
question
The protocol data unit for the Physical layer of the OSI model is payload, or data.​
answer
False
question
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read:
answer
Presentation
question
Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as:
answer
convergence
question
A standard network switch operates at what layer of the OSI model?
answer
Layer 2
question
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?​
answer
Network
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New