CSCI 379 Computer Networking Midterm Review (TestOut)

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/284

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

285 Terms

1
New cards

You've implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but they don't host services of their own.

Which type of network do you have?

Client-server

2
New cards

client-server network

hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources.

3
New cards

peer-to-peer network

each host can provide network resources to other hosts or access resources located on other hosts, and each host is in charge of controlling access to those resources.

4
New cards

intranet

private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network.

5
New cards

extranet

private network that uses internet technologies, but whose resources are made available to external (but trusted) users. For example, you might create a website on a private network that only users from a partner company can access.

6
New cards

Which of the following geographic network types is typically managed by a city as a public utility?

Personal area network (PAN)

Local area network (LAN)

Wide area network (WAN)

Metropolitan area network (MAN)

Metropolitan area network (MAN)

7
New cards

Metropolitan area network (MAN)

a network that can cover an entire city; where city typically owns and manages this network as a public utility.

8
New cards

Personal area network (PAN)

a small network for communication between personal devices. A LAN is contained to an office and managed by a business.

9
New cards

Wide area network (WAN)

a collection of LANs that are connected together to form a large internetwork. These connections are typically managed by an ISP.

10
New cards

You've implemented a network where each device provides all other devices on the network with access to shared files.

Which type of network do you have?

Peer-to-peer

11
New cards

Polling

a media access method where a single device grants permission to other devices to access the network.

12
New cards

Multiple access

describes a media access method where each device determines when the medium is free.

13
New cards

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network.

14
New cards

bus topology

Messages are broadcast to all devices connected to the network; has a single point of failure.

15
New cards

star topology

uses a hub or switch to connect all network connections to a single physical location. A patch cable failure makes the connected device unavailable.

16
New cards

ring topology

messages travel from one device to the next until they reach the destination device. If the message isn't intended for that device, the message is forwarded to the next device on the network. (uses a central device called an MSAU)

17
New cards

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

18
New cards

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices.

Which of the following network topologies should you implement?

Bus

Partial mesh

Star

Full mesh

Partial mesh

19
New cards

partial mesh topology

only some redundant paths exist; this topology is more practical and less expensive

20
New cards

full mesh topology

every device has a point-to-point connection with every other device. This provides full redundancy, but it's expensive and impractical.

21
New cards

Which of the following topologies connects all devices to a trunk cable?

Ring

Star

Bus

Mesh

Bus

22
New cards

Your manager has asked you to implement a network infrastructure that will accommodate failed connections.

Which of the following network topologies provides redundancy for a failed link?

Mesh

Star

Ring

Bus

Mesh

23
New cards

Which of the following topologies connects each device to a neighboring device?

Ring

Bus

Star

Mesh

Ring

24
New cards

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using?

Star

25
New cards

In the OSI model, which of the following functions are performed at the Application layer? (Select two.)

Integration of network functionality into the host operating system.

Enabling of communication between network clients and services.

Communication setup, maintenance, and teardown.

Standard setting for sending and receiving signals.

Device control for data transmission rates.

Integration of network functionality into the host operating system.

Enabling of communication between network clients and services.

26
New cards

Application layer

enables network services and integrates network functionality into the host operating system.

27
New cards

Session layer

The setup, maintenance, and teardown of communication happens at this layer

28
New cards

Data Link layer

controls the rate of data transmission between hosts (flow control).

29
New cards

Physical layer

sets standards for sending and receiving electrical signals between devices.

30
New cards

Which of the following are included as part of the Data Link layer specifications? (Select two.)

Data transmission between hosts

Digital data conversion

Physical network device identification

Physical topology

Cable and connector specifications

Data transmission between hosts

Physical network device identification

31
New cards

In the OSI model, what is the primary function of the Network layer?

Route messages between networks.

32
New cards

Network layer

responsible for routing messages between networks.

33
New cards

Transport layer

provides a transition between the upper and lower layers of the OSI model. (End-to-end flow control)

breaks down data into segments

34
New cards

What is the basic purpose of the OSI Physical layer?

Coordinate rules for sending and receiving electrical signals.

35
New cards

In the OSI model, which of the following functions are performed at the Presentation layer? (Select two.)

-Data encryption and compression

-Data format specifications

-Data frame transmission

-End-to-end flow control

-Network services

Data encryption and compression

Data format specifications

36
New cards

Presentation layer

encrypts data, changes and converts character sets, and compresses data. File formats (such as .jpg, .wmv, and .wav)

37
New cards

Which of the following tasks is associated with the Session layer?

-Data block breakdown

-Connection establishment

-Port number assignment

-IP address assignment

Connection establishment

38
New cards

During TCP/IP communication between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model.

Match the information format on the left with the appropriate layer of the OSI model on the right.

Transport layer

Network layer

Data Link layer

Physical layer

Bits, Frames, Packets, Segments

Transport - segments

Network - packets

Data Link - frames

Physical - bits

39
New cards

Which of the following functions are performed by the OSI Transport layer? (Select three.)

-End-to-end flow control

-Consistent data formatting between dissimilar systems

-Path identification and selection

-Reliable message delivery

-Packet formatting for delivery through the medium

-Media access control, logical topology, and device identification

-Data segmentation and reassembly

End-to-end flow control

Reliable message delivery

Data segmentation and reassembly

40
New cards

Match each networking function or device on the left with its associated OSI model layer on the right.

Application layer

Presentation layer

Session layer

Transport layer

Network layer

Data Link layer

Physical layer

Session ID Number, Modem, Port Number, Switch, Translates data, HTTP, Router

Application Layer - HTTP

Presentation Layer - Translates Data

Session Layer - Session ID

Transport Layer - Port Number

Network Layer - Router

Data Link Layer - Switch

Physical Layer - Modem

41
New cards

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more than once.

Presentation layer

Session layer

Transport layer

Network layer

Data Link layer

The Application layer -Session, Presentation, and Application layers.

The Transport layer - Transport layer.

The Internetwork layer - Network layer.

The Network layer (sometimes called the Link layer) -Physical and Data Link layers.

42
New cards

TCP/IP model

The Application layer -Session, Presentation, and Application layers.

The Transport layer - Transport layer.

The Internetwork layer - Network layer.

The Network layer (sometimes called the Link layer) -Physical and Data Link layers.

43
New cards

Which of the following is the process of breaking a message into packets, adding controls and other information, and then transmitting the message through the transmission medium?

Transformation

Segmentation

Encapsulation

Sequencing

Encapsulation

44
New cards

Encapsulation

the process of breaking a message into packets, adding controls and other information, and then transmitting the message through the transmission medium.

45
New cards

What is the purpose of a frame check sequence (FCS) footer?

Checksum error detection

46
New cards

Which term does the OSI model use that's different from the TCP/IP model in reference to the terms frame, packet, and segment?

Protocol data unit (PDU)

47
New cards

Match each TCP/IP layer with its function.

Breaks the data into pieces.

Adds physical addresses.

Prepares the data to be sent.

Adds logical addresses.

Breaks the data into pieces. - Transport

Adds physical addresses. - Link

Prepares the data to be sent. - Application

Adds logical addresses. - Internet

48
New cards

An illustration of a network diagram. Workstation 1, IP address 192.168.10.11/24 MAC address 080046123456 connected on int Fa0/3 to a switch Catalyst 2950XL IP address 192.168.10.2/24 MAC address 000b5f2a5111. Workstation 2, IP address 192.168.10.12/24 MAC address 080046987654 connected on int Fa0/2 to a switch Catalyst 2950XL IP address 192.168.10.2/24 MAC address 000b5f2a5111. Catalyst 2950XL IP address 192.168.10.2/24 MAC address 000b5f2a5111. Connected on int fa0/0 to a Cisco 2600 router int fa0/0 IP address 192.168.10.1/24 MAC address 000b52a2222, Cisco 2600 router int fa0/2 IP address 192.168.11.1/24 MAC address 000b52a2223. Workstation 3, IP address 192.168.11.11/24 MAC address 080046982365 connected on int fa0/2 to a Cisco 2600 router int fa0/2.Workstation2 needs to send data to Workstation3. Identify the Layer 2 and Layer 3 addresses Workstation2 will use to send the data by dragging the corresponding address from the list on the left to its location on the right.

Layer 2 source address - 080046987654

Layer 3 source address - 192.168.10.12

Layer 2 destination address - 000b5f2a2222

Layer 3 destination address - 192.168.10.12

49
New cards

An illustration of a network diagram. Workstation 1, IP address 192.168.10.11/24 MAC address 080046123456 connected on int Fa0/3 to a switch Catalyst 2950XL IP address 192.168.10.2/24 MAC address 000b5f2a5111. Workstation 2, IP address 192.168.10.12/24 MAC address 080046987654 connected on int Fa0/2 to a switch Catalyst 2950XL IP address 192.168.10.2/24 MAC address 000b5f2a5111. Catalyst 2950XL IP address 192.168.10.2/24 MAC address 000b5f2a5111. Connected on int fa0/0 to a Cisco 2600 router int fa0/0 IP address 192.168.10.1/24 MAC address 000b52a2222, Cisco 2600 router int fa0/2 IP address 192.168.11.1/24 MAC address 000b52a2223. Workstation 3, IP address 192.168.11.11/24 MAC address 080046982365 connected on int fa0/2 to a Cisco 2600 router int fa0/2.

Layer 2 source address - 000b5f2a2222

Layer 3 source address - 192.168.11.11

Layer 2 destination address - 080046987654

Layer 3 destination address - 192.168.10.12

50
New cards

When does a router use ARP?

When the router's routing table doesn't contain the MAC addresses of devices on the local LAN that they need to forward frames to.

51
New cards

ARP (Address Resolution Protocol)

resolves IP addresses into MAC addresses. Routers and other network devices use this when their routing tables don't contain the MAC addresses of devices on the local LAN that they need to forward frames to.

52
New cards

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?

-Hosts use ARP to resolve known IP addresses into MAC addresses.

-Diskless workstations use ARP to ask a server for an IP address.

-Routers use DNS to resolve MAC addresses of diskless workstations into IP addresses based on the information contained in other routers' routing tables.

-ICMP lets routers bypass the general network broadcast by providing a dynamic table of IP-to-MAC address mappings.

Hosts use ARP to resolve known IP addresses into MAC addresses.

53
New cards

DNS (Domain Name System)

used to map hostnames to IP addresses

54
New cards

Diskless workstations

use BOOTP to discover their IP address, the server's IP address, and the boot files they should use.

55
New cards

ICMP

notifies routers of problems on the network and undeliverable packets.

56
New cards

During network transmission, data is transferred to various routers, which forward the data to the appropriate network. If the source and destination network addresses reside on the same network, which protocol is used to determine the destination IP's MAC address?

ARP

57
New cards

UDP(user datagram protocol) vs. TCP(Transmission Control Protocol)

TCP is a connection based protocol(reliable/slow); UDP is connectionless(less reliable/fast)

58
New cards

TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back?

59
New cards

SYN

used to start a connection between hosts.

60
New cards

ACK

acknowledges the receipt of a packet.

61
New cards

RST

resets a connection.

62
New cards

SYN/ACK

If Computer 1 sends a SYN packet to Computer 2, Computer 2 receives the packet and sends a SYN/ACK packet to Computer 1. Computer 1 receives the SYN/ACK packet and replies back with an ACK packet, and the connection is complete.

63
New cards

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?

-DHCP

-ICMP

-TFTP

-IGMP

ICMP

64
New cards

Internet Control Message Protocol (ICMP)

allows hosts to exchange messages to indicate a packet's status as it travels through a network.

65
New cards

IGMP (Internet Group Management Protocol)

establishes multicast group memberships, which allows a computer to send a single network packet to multiple hosts on a network at the same time.

66
New cards

DHCP (Dynamic Host Configuration Protocol)

is used to automatically assign addresses and other configuration parameters to network hosts.

67
New cards

TFTP (Trivial File Transfer Protocol)

is often used when files need to be transferred between systems quickly.

68
New cards

You have a large TCP/IP network and want to keep a host's real-time clock synchronized. Which protocol should you use?

NTP

69
New cards

Network Time Protocol (NTP)

keeps computers' clocks synchronized.

70
New cards

SMTP (Simple Mail Transfer Protocol)

used to send mail between email servers.

71
New cards

SNMP (Simple Network Management Protocol)

lets network administrators set up alerts to monitor the state of a network.

72
New cards

FTP (File Transfer Protocol)

provides a generic method for transferring files.

73
New cards

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between email servers. Currently, each network uses an email package from a different vendor.

Which TCP/IP protocol enables message exchange between systems?

SMTP

74
New cards

You're an application developer, and you're writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery.

Which TCP/IP protocol provides this capability?

TCP

75
New cards

SIP (Session Initiation Protocol)

an open-source VoIP protocol.

76
New cards

UDP

host-to-host protocol; doesn't acknowledge that each packet was transmitted.

77
New cards

Which of the following features does UDP provide? (Select two.)

-Packet acknowledgment

-Lost packet retransmission

-Connectionless datagram services

-Data packet sequencing

-Low overhead

Connectionless datagram services

Low overhead

78
New cards

TCP

provides data packet sequencing, packet acknowledgement, and lost packet retransmission.

79
New cards

You've recently installed a new Windows server. To ensure system time accuracy, you've loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now you must configure your network firewall to allow time synchronization traffic through.

Which of the following ports are you MOST LIKELY to open on the firewall?

123

80
New cards

TCP/IP port 123

is assigned to Network Time Protocol (NTP).

81
New cards

TCP/IP port 80

HyperText Transfer Protocol (HTTP) uses this port. HTTP is the protocol used to send requests to a web server and retrieve web pages from the web server.

82
New cards

TCP/IP port 119

used by the Network News Transfer Protocol (NNTP). NNTP is used to access and retrieve messages from newsgroups.

83
New cards

TCP/IP port 110

used by Post Office Protocol version 3 (POP3). POP3 is used to download email from mail servers.

84
New cards

Which port number is used by SNMP?

161

85
New cards

TCP/IP Port 25

SMTP (Simple Mail Transfer Protocol) uses this port

86
New cards

You're configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic.

Which of the following TCP/IP ports should you open on the firewall? (Select two.)

25

110

87
New cards

TCP/IP port 143

Internet Message Access Protocol version 4 (IMAP4) uses this port

88
New cards

TCP/IP port 443

Secure Sockets Layer (SSL) uses this port

89
New cards

Which port does Telnet use?

23

90
New cards

TCP/IP Port 23

Telnet uses this port

91
New cards

TCP/IP Port 53

Domain Name System (DNS) uses this port

92
New cards

Which of the following network services or protocols uses TCP/IP port 69?

SMTP

NNTP

TFTP

POP3

TFTP

93
New cards

Trivial File Transfer Protocol (TFTP)

a connectionless service for downloading files from a remote system. It's often used for downloading firmware to networking devices.

94
New cards

You're installing network wiring for a new Ethernet network at your company's main office building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Cat 3 network cable in storage. Upon closer inspection, it appears very similar to the Cat 5e wiring.

To finish the project, should you use the Cat 3 cabling as a substitute for the Cat 5e cabling?

No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing crosstalk and supporting higher data rates.

95
New cards

Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated?

Cat 5e

Cat 6

Cat 5

Cat 3

Cat 6

96
New cards

Cat 6 cables

include a solid plastic core that keeps the twisted pairs separated and prevents the cable from being bent too tightly

97
New cards

You're adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You'd like to run your Ethernet cables in this area.

Which type of cable must you use?

Plenum-rated cable

98
New cards

Plenum-rated cable

fire resistant and non-toxic cable; must be used to wire in air spaces used by heating and air conditioning systems.

99
New cards

Why might you use an RJ11 connector?

You want to connect your computer to the internet with a DSL modem.

100
New cards

RJ11 connectors

are typically used for telephones and modems.