1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)
video
web
file transfer
voice
peer to peer
Video, Voice (RTP is used for real-time communications like video and VoIP)
Which wireless technology has low-power and data rate requirements, making it popular in home automation?
ZigBee
LoRaWAN
5G
Wi-Fi
ZigBee (IEEE 802.15.4 standard, optimized for low-energy personal-area networks)
Which TCP/IP model layer provides a route to forward messages through an internetwork?
application
network access
internet
transport
Internet layer (Corresponds to OSI network layer, responsible for addressing and routing)
Which type of server uses records such as A, NS, AAAA, and MX?
DNS
file
web
DNS server (Resolves hostnames to IP addresses and manages resource records)
What are proprietary protocols?
Protocols developed by private organizations to operate on any vendor hardware
Protocols that can be freely used by any organization or vendor
Protocols developed by organizations who control their definition and operation
A collection of protocols known as the TCP/IP suite
Protocols developed by organizations who control their definition and operation
What service is provided by DNS?
Resolves domain names into IP addresses
Defines rules for exchanging multimedia on the web
Allows data transfers between a client and file server
Uses encryption for secure web exchange
Resolves domain names into IP addresses
A packet with destination port 110 is requesting which service?
DNS
DHCP
SMTP
POP3
POP3
What Windows command shows the IP configuration?
show ip interface brief
ping
show interfaces
ipconfig
ipconfig
A wired printer shared on a home network without a dedicated server is using which model?
client-based
master-slave
point-to-point
peer-to-peer (P2P)
Peer-to-peer (P2P)
What describes a virus?
A network device that filters access
Use of stolen credentials to access data
An attack that slows/crashes a device or service
Malicious code running on an end device
Malicious code running on an end device
With QoS, prioritize audio conference, financial transactions, and web browsing.
financial transactions, web page, audio conference
audio conference, financial transactions, web page
financial transactions, audio conference, web page
audio conference, web page, financial transactions
Audio conference → financial transactions → web page
When transferring a file, which TCP/IP layers are used?
application + internet
internet + network access
application + internet + network access
application + transport + internet + network access
application + transport + network + data link + physical
application + session + transport + network + data link + physical
Application, transport, internet, and network access layers
What service does Internet Messenger provide?
Real-time chatting among remote users
Remote access to network devices
Resolves domain names into IP addresses
Secure remote access to devices with encryption
Real-time chatting among remote users
Which protocol built the table shown by arp -a?
DHCP
ARP
DNS
ICMP
ARP
Which two factors may interfere with copper cabling near fluorescent lights/equipment?
crosstalk
extended length
RFI
EMI
signal attenuation
RFI, EMI
If a host sends a packet to a remote LAN with no ARP cache entry, how is the MAC address obtained?
Send frame using its own MAC as destination
Send ARP request for destination device’s MAC
Send frame with broadcast MAC
Send request to DNS server for MAC
Send ARP request for MAC of default gateway
Send ARP request for MAC of default gateway