Computer Networking Chapter 7

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:41 AM on 10/29/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

50 Terms

1
New cards

PTP can be deployed as a layer 3 protocol over IP. What is a limitation of this deployment?

It cannot achieve the same accuracy as layer 2 implementations.

It is incompatible with most network adapters.

It requires additional satellite synchronization.

It increases the network bandwidth usage significantly

It cannot achieve the same accuracy as layer 2 implementations.

2
New cards

What is established between a server and a client after successful authentication with TLS?

A public network

An encrypted tunnel

A data compression protocol

A direct physical connection

An encrypted tunnel

3
New cards

You are the network administrator for a small consulting firm. You've set up an NTP server to manage the time across all the machines in the network.

You have a computer that's experiencing a slight time drift of just a few seconds.

Which time correction should you use to fix the system's clock?

Slam

Slew

Skew

Jitter

Slew

4
New cards

What is it called when a system's clock begins to be off by a few seconds or even minutes?

Slew

Time drift

Dispersion

Slam

Time drift

5
New cards

You are setting up a secure website for your online store. You want to ensure that all data transmitted between your website and your customers is encrypted.

Which of the following steps is essential for you to achieve this?

Obtain and install a digital certificate.

Install a web analytics tool.

Increase your website's bandwidth.

Implement a CAPTCHA system on your website.

Obtain and install a digital certificate.

6
New cards

What can happen if a server or host is configured with the incorrect time?

It can lead to increased network speed

It will increase the security of network communications

It will automatically correct itself without NTP

It may not be able to access network services

It may not be able to access network services

7
New cards

What happens during a TLS handshake?

The server provides its digital certificate to the client for authentication.

The server and client agree on a data compression method.

The server's processing load is reduced.

The client and server negotiate network congestion management.

The server provides its digital certificate to the client for authentication.

8
New cards

What is the main advantage of Precision Time Protocol (PTP) over Network Time Protocol (NTP)?

PTP is easier to implement.

PTP supports more network services.

PTP provides nanosecond precision.

PTP uses less network bandwidth.

PTP provides nanosecond precision.

9
New cards

Which of the following time standards does NTP use?

EDT

PDT

CDT

UTC

UTC

10
New cards

What role does a grandmaster clock play in a PTP domain?

It acts as the primary backup time source.

It synchronizes directly with satellite clocks.

It is the authoritative time source.

It serves as the primary network router.

It is the authoritative time source.

11
New cards

What does the term "stateless protocol" imply about HTTP?

Each request from a client to a server is treated as a new request.

The server stores data in a centralized database for all requests.

The server retains information about client requests indefinitely.

The server requires authentication for every request.

Each request from a client to a server is treated as a new request.

12
New cards

Which TCP port does HTTPS encrypted traffic default to?

8080

80

21

443

443

13
New cards

Why is FTPES usually preferred over FTPS?

FTPES supports larger file transfers.

FTPES is faster than FTPS.

FTPES uses stronger encryption than FTPS.

FTPES is easier to configure with firewalls.

FTPES is easier to configure with firewalls.

14
New cards

What feature does version 2 of HTTP add to enhance its functionality?

More state-preserving features

Increased encryption

Improved FTP support

Faster email transmission

More state-preserving features

15
New cards

What is the primary function of a database?

To provision information in a format that can be read and updated

To serve as a graphical user interface for data management

To store data in a static format that cannot be updated

To encrypt data using transport layer security

To provision information in a format that can be read and updated

16
New cards

Which of the following is a limitation of active FTP mode regarding firewalls?

It only works with TCP port 22.

It encrypts the data transfer by default.

It can cause configuration problems due to unpredictable port usage.

It requires HTTPS for data transfer.

It can cause configuration problems due to unpredictable port usage.

17
New cards

Which operating system is typically used by NAS appliances?

iOS

Windows

MacOS

Linux-based

Linux-based

18
New cards

What is the purpose of using TLS transport encryption in databases?

To improve the graphical user interface

To increase data storage capacity

To secure data transmission over the network

To synchronize data between servers

To secure data transmission over the network

19
New cards

In the context of FTP over Explicit TLS (FTPES), which command is used to encrypt the data connection for actual file transfers after upgrading an unsecure connection to a secure one?

PASV

SSH

AUTH TLS

PROT

PROT

20
New cards

Why is SMB1 now disabled by default on current Windows versions?

It does not support printing services.

It is too slow.

It has very serious security vulnerabilities.

It does not support encryption.

It has very serious security vulnerabilities.

21
New cards

Which protocol is typically used for copy or backup operations on a NAS appliance?

SNMP

SMB or FTP

HTTP

SMTP

SMB or FTP

22
New cards

What does a client use to identify the resource it wants to request from an HTTP server?

Port number

Uniform Resource Locator (URL)

IP address

MAC address

Uniform Resource Locator (URL)

23
New cards

What is the primary purpose of the File Transfer Protocol (FTP)?

To stream video content

To encrypt web traffic

To send email messages

To transfer files between a client and server

To transfer files between a client and server

24
New cards

Why might TFTP not be suitable for transferring large files?

It encrypts the data, causing overhead.

It requires manual confirmation for each packet.

It operates over UDP, which does not guarantee delivery.

It only works within local networks.

It operates over UDP, which does not guarantee delivery.

25
New cards

Which version of SMB supports message encryption?

All versions

SMB3

SMB2

SMB1

SMB3

26
New cards

What is a key advantage of using VoIP technology over traditional PSTN lines?

Limited call routing options

Ability to transmit voice over IP networks

Higher call costs

Requirement for separate voice and data channels

Ability to transmit voice over IP networks

27
New cards

How do VoIP phones use VLAN tagging?

To prioritize video traffic over voice traffic

To ensure that voice and data traffic are combined on the same network

To disable all data traffic except for VoIP communication

To ensure that SIP control and RTP media protocols are segregated from normal data traffic

To ensure that SIP control and RTP media protocols are segregated from normal data traffic

28
New cards

How do VoIP phones distinguish data traffic from voice traffic?

By using digital certificates for voice traffic only

By configuring separate VLAN IDs for data and voice traffic

By using separate physical links for each type of traffic

By prioritizing voice traffic over data traffic using PoE

By configuring separate VLAN IDs for data and voice traffic

29
New cards

What is a significant difference between a TDM PBX and a VoIP PBX?

A TDM PBX can only support voice mail, while a VoIP PBX cannot.

A TDM PBX is supplied as vendor-specific hardware, while a VoIP PBX can be implemented as software.

A VoIP PBX requires a separate data channel for each call, while a TDM PBX does not.

A TDM PBX uses the Internet for all calls, while a VoIP PBX uses the PSTN.

A TDM PBX is supplied as vendor-specific hardware, while a VoIP PBX can be implemented as software.

30
New cards

What is one of the primary purposes of the Internet Message Access Protocol (IMAP)?

To connect to web servers

To encrypt email messages

To deliver email to hosts that are permanently available

To manage a mailbox on a server

To manage a mailbox on a server

31
New cards

What is the purpose of the STARTTLS command in SMTP?

To create a new email account

To upgrade an existing unsecure connection to use TLS

To encrypt the entire email message content

To downgrade the connection to an unsecure state

To upgrade an existing unsecure connection to use TLS

32
New cards

What does SMTP use to discover the IP address of the recipient's SMTP server?

The domain name part of the recipient's email address

The sender's IP address

The recipient's physical address

The recipient's email password

The domain name part of the recipient's email address

33
New cards

In a Windows environment, which protocol is typically used to access Microsoft Exchange mailboxes?

SMTP

IMAP

MAPI

HTTPS

MAPI

34
New cards

What is the purpose of using a tel: URI scheme in SIP systems?

To encrypt voice communications

To compress audio data for transmission

To dial a landline or cell phone

To assign unique identifiers to devices

To dial a landline or cell phone

35
New cards

Which of the following is a unique identifier used by SIP endpoints?

MAC address

SIP URI

IP address

DNS name

SIP URI

36
New cards

What distinguishes a Layer 7 switch from a Layer 4 switch in load balancing?

Layer 7 switch makes forwarding decisions based on application-level data.

Layer 7 switch is used exclusively for encrypting data traffic.

Layer 7 switch increases the storage capacity of servers.

Layer 7 switch operates at the network layer.

Layer 7 switch makes forwarding decisions based on application-level data.

37
New cards

What is the primary challenge of entering into reciprocal arrangements for disaster recovery?

It is too expensive.

It is complex to plan and set up.

It is simple to plan and set up.

It does not provide mutual support.

It is complex to plan and set up.

38
New cards

What is a virtual IP in the context of high availability clusters?

A shared or floating address used to access the service provided by the cluster.

A unique IP address assigned to each node in the cluster.

An IP address used exclusively for load balancing.

The private IP address used for the management of cluster nodes.

A shared or floating address used to access the service provided by the cluster.

39
New cards

What does Recovery Time Objective (RTO) measure in disaster recovery planning?

The maximum amount of data loss that is acceptable

The time following a disaster within which a system must be restored

The amount of time needed to perform system maintenance

The time it takes to detect a system failure

The time following a disaster within which a system must be restored

40
New cards

What is the significance of conducting validation tests in disaster recovery?

To increase the company's market share

To ensure services can be restored

To assess the effectiveness of marketing strategies

To evaluate the company's financial health

To ensure services can be restored

41
New cards

What does MTTF stand for, and how is it different from MTBF?

Mean Time to Fix; MTTF and MTBF are interchangeable terms.

Mean Time to Failure; MTTF is used for non-repairable components, while MTBF is for repairable ones.

Maximum Time to Failure; MTTF is used for predicting the longest operational time, while MTBF is an average.

Maximum Time to Fix; MTTF is used for repairable components, while MTBF is for non-repairable ones.

Mean Time to Failure; MTTF is used for non-repairable components, while MTBF is for repairable ones.

42
New cards

What is the purpose of a Business Impact Analysis (BIA) in continuity planning?

To identify the most profitable business areas

To assess the impact of new hires on the business

To evaluate the effectiveness of sales strategies

To identify risk disruption for primary business functions

To identify risk disruption for primary business functions

43
New cards

Where is a load balancer typically placed in a network topology?

Within the client network

Between the client network and the Internet

Directly on the application servers

Between the Internet and the application servers

Between the Internet and the application servers

44
New cards

What does an availability of "five-nines" (99.999%) signify in disaster recovery?

The system requires maintenance 99.999% of the time.

The system is available for 99.999% of the time.

The system is unavailable for 99.999% of the time.

The system can recover from any disaster in 99.999% of cases.

The system is available for 99.999% of the time.

45
New cards

In an active-active cluster configuration, what happens in the event of a failover?

The remaining nodes are shut down to prevent data corruption.

The workload of the failed node is shifted onto the remaining node(s).

The system automatically purchases and adds a new node to the cluster.

The workload of the failed node is not shifted, and the system goes offline.

The workload of the failed node is shifted onto the remaining node(s).

46
New cards

What does disaster recovery focus on?

Expanding the business to new markets

Developing new products

Increasing the number of employees

Switching services to failover systems or sites

Switching services to failover systems or sites

47
New cards

In HSRP, what term is used to describe the group of routers configured to work together as a single default gateway?

Active group

Backup group

Standby group

Virtual group

Standby group

48
New cards

What is the main difference between a hot site and a warm site?

A hot site requires the latest data set to be loaded.

A warm site requires the latest data set to be loaded.

A hot site is an empty building.

A warm site is ready to deploy immediately.

A warm site requires the latest data set to be loaded.

49
New cards

Which of the following is NOT a component of a fully redundant server configuration?

Multiple cooling fans

Redundant storage

Single network card

Multiple power supplies

Single network card

50
New cards

Which FHRP is designed to work in an active/standby configuration?

EIGRP

GLBP

HSRP

OSPF

HSRP

Explore top flashcards