WGU D315 Network and Security - Foundations; PA and OA complete questions bank (232 exam questions and answers)

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/231

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

232 Terms

1
New cards

It is a network of users that share computer resources in a limited area.

LAN

2
New cards

How are Local Area Networks defined?

In terms of protocol and the topology used for accessing the network.

3
New cards

A set of rules established for users to exchange information

Protocol

4
New cards

The network architecture used to interconnect the networking equipment.

Topology

5
New cards

What are the most common topologies for LANs?

Ring, Bus, and Star

6
New cards

Uses a token that is placed in the data channel and circulates around the ring.

Token Ring topology

7
New cards

A deterministic network

Token Ring Topology

8
New cards

Each station connected to the network ensures access for transmission of its messages at regular or fixed time intervals

Deterministic

9
New cards

What are the disadvantages of the Token Ring system?

1. If an error changes the token pattern, it can cause the token to stop circulating.

10
New cards

What is a disadvantage of the Token Ring system from the troubleshooting and maintenance?

The token ring path must be temporarily broken or interrupted if a computer or any device on the network is to be removed or added to the network.

11
New cards

What is a solution to the troubleshooting and maintenance disadvantages of the Token Ring system?

Connect each computer or device on the network to a central token ring hub.

12
New cards

A device that manages the passing of the token instead of relying on individual computers to pass it.

Token ring hub

13
New cards

How does the token ring hub improve the network?

It improves the reliability of the network.

14
New cards

Topology whereas the computers share the media or coaxial cable for data transmission.

Bus topology

15
New cards

The coaxial cable that is looped through each networking device to transmit data in a bus topology

ThinNet

16
New cards

In this topology, all devices on the network can see each other's data traffic.

Bus topology

17
New cards

Topology whereas each computer must wait for pauses in transmission or until the transmission from one device is complete before initiating a new transmission onto the network.

Bus topology

18
New cards

What are the disadvantages of a bus topology?

"1. Data can be corrupted if ore than one device on the network transmits at the same time and will have to be resubmitted.

2. The use of the shared coaxial cable prevents data transmission from being very bandwidth-efficient."

19
New cards

Which topology is seldomly used in modern networks?

Bus topology

20
New cards

What is the most common topology used in today's LANs?

Star topology

21
New cards

Topology that uses twisted-pair cables with modular plugs to connect computers and other networking devices.

Star topology

22
New cards

Topology whereas each device is connected to a switch or hub

Star

23
New cards

A switch or hub facilitates the transfer of data between networking devices in this topology

star

24
New cards

Transmits data to all the devices connected in the star network

hub

25
New cards

Also called a multiport repeater

hub

26
New cards

Not meant for large networks, but are still used in some smaller, slower speed LANs

hub

27
New cards

A transmission from a hub in a star network to all the devices in the network connected to the hub

broadcast

28
New cards

Stores the hardware or physical address for each device connected to its ports in a star network

switch

29
New cards

Sends data transmissions directly to the port of the destination device on the network

switch

30
New cards

The physical input/output interfaces to the networking hardware

port

31
New cards

Where the cables physically connect to each other or a central switch or hub

Port

32
New cards

Only the intended destination device on this network will see the data traffic

star

33
New cards

What is an advantage of the star topology?

It improves the efficiency of the available bandwidth of the network

34
New cards

What is an advantage of the star topology from the troubleshooting and maintenance?

A device can be removed or added without disrupting other devices on the network

35
New cards

All devices are connected to each other

mesh topology

36
New cards

What is an advantage of the mesh network?

It provides full redundancy in the network data paths

37
New cards

What is a disadvantage of the mesh network?

The additional data paths increase the cabling cost and the network hardware cost. It is also very complex.

38
New cards

What type of applications is the mesh topology suited for?

high-reliability applications

39
New cards

What type of applications is the mesh topology not suited for?

general networking applications

40
New cards

Open systems interconnect reference model

OSI

41
New cards

Who was the OSI model developed by?

The International Organization for Standardization

42
New cards

What year was the OSI model developed?

1984

43
New cards

What is the purpose of the OSI model?

to enable different types of networks to be linked together

44
New cards

What is OSI meant for?

To provide a framework for networking devices that ensure compatibility in the network hardware and software.

45
New cards

What is the OSI model meant to accelerate?

The development of new networking technologies.

46
New cards

What is layer 1 of the OSI model?

Physical

47
New cards

The layer of the OSI model that provides the electrical and mechanical connection to the network.

physical

48
New cards

UTP, fiber, and network interface cards are examples of which layer of the OSI model?

physicaL

49
New cards

What is layer 2 of the OSI model?

Data link

50
New cards

Layer of the OSI model that handles error recovery, flow control (synchronization), and sequencing (which terminals are sending and which are receiving)

data link

51
New cards

Also called the media access control layer

data Link

52
New cards

The layer of the OSI model where the Media Access Control or MAC, addressing is defined

data lInk

53
New cards

Where is the Ethernet 802.3 standard defined?

In the MAC or media access control

54
New cards

Also called the Ethernet address

MAC or media access control

55
New cards

MAC addresses are an example of which layer of the OSI model?

data linK

56
New cards

What is layer 3 of the OSI model?

Network

57
New cards

layer of the OSI model that accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information.

network

58
New cards

Acts as the network controller

network layer of the OSI model

59
New cards

Internet Protocol (IP) and internetwork packet exchange (IPX) are examples of which layer of the OSI model?

networK

60
New cards

What is layer 4 of the OSI model?

Transport

61
New cards

layer of the OSI model that is concerned with message integrity between source and destination

transport

62
New cards

layer of the osi model that also segments/reassembles the packes and handles flow control

tRansport

63
New cards

Transmission control protocol (TCP) and User Datagram Protocol are examples of which layer of the OSI model?

transporT

64
New cards

What is layer 5 of the osi model?

Session

65
New cards

layer of the osi model that provides the control functions necessary to establish, manage, and terminate the connections as required to satisfy the user request

session

66
New cards

Network File system (NFS) and Structured Query Language (SQL) are examples of which osi model layer?

sessioN

67
New cards

What is layer 6 of the osi model?

Presentation

68
New cards

layer of the osi model that accepts and structures the messages for the application. If necessary, it will translate one code to another

presentation

69
New cards

layer of the osi model that is also responsible for data compression and encryption

pResentation

70
New cards

American Standard Code for Information Interchange (ASCII) and Joint Photographic Experts Group (JPEG) are examples of which layer of the OSI model?

presentatioN

71
New cards

What is layer 7 of the osi model?

Application

72
New cards

layer of the osi model that interacts with application programs that incorporate a communication component such as your internet browser and email

application

73
New cards

layer of the osi model that is also responsible for logging the message in, interpreting the request, and determining what information is needed to support the request

aPplication

74
New cards

Hypertext Transfer Protocol (HTTP) for web browsing, File Transfer Protocol (FTP) for transferring files, and Simple Mail Transfer Protocol (SMTP) for email transmission are examples of which osi model layer?

applicatioN

75
New cards

What is step one of the three basic steps in the process of isolating a network problem?

Is the connection to the machine down (layer 1)

76
New cards

What is step two of the three basic steps in the process of isolating a network problem?

Is the network down? layer 3

77
New cards

What is step three of the three basic steps in the process of isolating a network problem?

Is a service on a specific machine down? layer 7

78
New cards

A reply from" response from a ping indicates whate?"

A connection to the server is up

79
New cards

A request timed out" response from a ping indicates what?"

the network connection is down

80
New cards

What is the function of the data link layer of the osi model?

to provide for the flow of data MAC addresses

81
New cards

What is the function of the network layer?

to provide routing decisions IP, IPX

82
New cards

What is the function of the transport layer of the osi model?

to ensure error free packets

83
New cards

What is the function of the session layer of the osi model?

to establish, manage, and terminate NFS, SQL sessions

84
New cards

What is the function of the presentation layer of the osi model?

to ensure protocol conversion, data transactions ASCII, JPEG

85
New cards

What is function of the application layer of the osi model?

to support applications HTTP, FTP, and SMTP(email)

86
New cards

Which networking protocol is used in most modern computer networks?

Ethernet

87
New cards

A carrier sense multiple access with collision detection protocol for local area networks

Ethernet

88
New cards

Must have the capability to detect data collisions (collision detection) to avoid two or more computers from attempting to broadcast a message at the same time.

Ethernet systems

89
New cards

Provide grouping of information for transmission

packet

90
New cards

What does the header of a packet consist of?

The preamble, start frame delimiter, destination and source addresses, and length/type field

91
New cards

Preamble, start frame delimiter, destination mac address, source address, length/type, data, pad, and frame check sequence.

The structure of the Ethernet frame

92
New cards

An alternating pattern of 1s and 0s used for synchronization

The preamble of an Ethernet packet

93
New cards

A binary 8 bit sequence of 10101011 that indicates the start of the frame

The start frame delimiter of an Ethernet packet

94
New cards

The MAC address associated with the network adapter or Ethernet network interface card (NIC)

The destination and source MAC addresses of an Ethernet packet

95
New cards

An indication of the number of bytes in the data field if this value is less than 1500, or if the number is greater than 1500, and indication of the type of data format such as IP and IPX

The length/type of the Ethernet packet frame

96
New cards

The variable length of data being transferred from the source to the destiontion

The data of the Ethernet packet frame

97
New cards

A field used to bring the total number of bytes up to the minimum of 46 if the data field is less than 46 bytes

The pad of the Ethernet packet frame

98
New cards

A 4 byte CRC value used for error detection

The frame check sequence of the Ethernet packet frame

99
New cards

What is the minimum length of the Ethernet frame from destination MAC address through the frame check sequence?

64 bytes

100
New cards

a device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all

range extender