Test review of First Module from ICND Pt1 Vol 1 Ver 1
Networks are used to transmit data in many kinds of environments, including homes, small businesses, and large enterprises.
A main office can have hundreds or even thousands of people who depend on network access to do their jobs.
A network is a connected collection of devices that can communicate with each other.
A main office usually has one large network to connect all users.
The purpose of a network is to create a means to provide all workers with access to all information and components that are accessible by the network. Remote locations cannot connect to a main office through a network.
To interconnect networks and choose the best paths between them
to provide the connection points for the media
to serve as the end point in the network, sending and receiving data
to provide the means by which the signals are transmitted from one networked device to another
To connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient route
To choose the path over which data is sent to its destination
To serve as the end point in the network, sending and receiving data
To provide network attachment to the end systems and intelligent switching of the data within the local network
To connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient route
To choose the path over which data is sent to its destination
To provide a means for data to travel from one point to another in the network
To provide network attachment to the end systems and intelligent switching of the data within the local network
Memory
Applications
Peripherals
Storage devices
Collaboration
Graphics creation
Databases
Spreadsheets
A physical topology defines the way in which the computers, printers, network devices, and other devices are connected.
There are two primary categories of physical topologies: bus and star.
A physical topology describes the paths that signals travel from one point on a network to another.
The choice of a physical topology is largely influenced by the type of data to be transmitted over the network.
A logical topology defmes the way in which the computers, printers, network devices, and other devices are connected.
A logical topology depends solely on the type of computers to be included in the network.
A logical topology describes the paths that the signals travel from one point on a network to another.
A network cannot have different logical and physical topologies.
Star
Bus
Ring
Partial-mesh
Dual ring
Instead of cables, wireless communication uses RF or infrared waves to transmit data.
To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.
For wireless LANs, a key component is a router, which propagates signal distribution.
Wireless networks are not very common, and generally only large corporations use them.
Deliberate attack from outside
a deliberate or accidental attack from inside
misuse by customers
misuse by employees
Hacker tools require more technical knowledge to use
Hacker tools have become more sophisticated.
The number of reported security threats has remained constant year to year
Hacker tools require less technical knowledge to use
Password attacks
DDoS
Trojan horse
Love Bug
The OSI model defines the network functions that occur at each layer.
The OSI model ensures reliable data delivery through its layered approach
The OSI model allows changes in one layer to affect the other layers
The OSI model facilitates an understanding of how information travels throughout a network.
uses sets of rules that tell the services of a network what to do
Ensures reliable delivery of data
Routes data to its destination in the most efficient manner
Is a set offunctions that determine how data is defined
Network layer
Transport layer
Application layer
Data link layer
16
32
64
128
Class A
Class B
Class C
Class D
A broadcast address is an address that has all Os in the host field.
Any IP address in a network can be used as a broadcast address
A directed broadcast address is an address that has all 1 s in the host field.
None of the above is correct.
10.215.34.124
127.16.71.43
172.17.10.10
225.200.15.10
IP is a connectionless protocol
IP uses relational addressing
IP delivers data reliably
IP does not provide any recovery functions.
IP delivers data on a best-effort basis
TCP operates at Layer 3 of the TCP/IP stack.
TCP is a connection-oriented protocol.
TCP provides no error checking
TCP packets are numbered and sequenced so that the destination can reorder packets and determine if a packet is missing.
Upon receipt of one or more TCP packets, the receiver returns an acknowledgment to the sender indicating that it received the packets.
Operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack
Capable of performing a very limited form of error checking
Provides service on a best-effort basis and does not guarantee packet delivery
Provides no special features that recover lost or corrupted packets
Windowing
Session multiplexing
Segmenting
Connection-oriented protocol
Voice streaming
Downloading
Video streaming
Packets are treated independently
Packet delivery is guaranteed
Packet delivery is not guaranteed
Lost or corrupted packets are not resent
Packet delivery is not guaranteed
Lost or corrupted packets are not resent
Lost or corrupted packets are resent
TCP segment contains a sequence number and an acknowledgment number
Dynamically assigned ports
Well-known ports
Registered ports
16-bit number of the called port
16-bit length of the header
16-bit sum of the header and data fields
16-bit number of the calling port
Dynamically assigned ports
Well-known ports
Registered ports
Acknowledgment number
Sequence number
Reserved
Options
ACK
Receive SYN
Send SYN
Flow control
TCP connection
TCP sequencing
Reliable connections
The sender can multiplex
The receiver can have outstanding acknowledgments
The receiver can multiplex
The sender can transmit a specified number of unacknowledged segments
UDP Header
TCP Header
Initial sequence number
Application Layer
ISO
IEEE
EIA
IEC
Based on the CSMA/CD process
Is a standard that has been replaced by Ethernet II
Specifies the physical layer (Layer 1)
Developed in the mid-1970s
Specifies the MAC portion of the data link layer (Layer 2)
The address used in an Ethernet LAN directs data to the proper receiving location.
The source address is the 4-byte hexadecimal address of the NIC on the computer that is generating the data packet.
The destination address is the 8-byte hexadecimal address of the NIC on the LAN to which a data packet is being sent
Both the destination and source addresses consist of an 8-byte hexadecimal number.
A MAC address is a number in hexadecimal format that is physically located on the NIC.
A MAC address is represented by hexadecimal digits that are organized in paIrs
It is not necessary for a device to have a unique MAC address to participate in the network.
The MAC address can never be changed.
The NIC plugs into a USB port and provides a port for connecting to the network.
The NIC communicates with the network through a serial connection and communicates with the computer through a parallel connection
The NIC communicates with the network through a parallel connection and communicates with the computer through a serial connection.
An NIC is also referred to as a switch adapter
Cat 3
Cat 4
Cat 5
Cat 5e
UTP cable is an eight-pair wire.
An insulating material covers each of the individual copper wires in UTP cable.
The wires in each pair are wrapped around each other.
There is limited signal degradation from EMI and RFI.
There are seven categories of UTP cable.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.