Flashcards
Operating systems and networks - Set 1
Flashcards for quick repetition. Test your networks and operating systems knowledge.
Flashcards: 124
Played: 3803 times
What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)
to identify missing segments at the destination
to determine if the packet changed during transit
to limit the number of segments that can be sent out of an interface at one time
to reassemble the segments at the remote location
to identify missing segments at the destination
to reassemble the segments at the remote location
Which two tasks are functions of the presentation layer? (Choose two.)
compression
encryption
addressing
session control
authentication
Which three statements characterize UDP? (Choose three.)
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
UDP relies on application layer protocols for error detection.
UDP provides sophisticated flow control mechanisms.
UDP provides basic connectionless transport layer functions.
UDP provides connection-oriented, fast transport of data at Layer 3.
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
UDP relies on application layer protocols for error detection.
UDP provides basic connectionless transport layer functions.
What is a key characteristic of the peer-to-peer networking model?
social networking without the Internet
resource sharing without a dedicated server
network printing using a print server
wireless networking
resource sharing without a dedicated server
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?
tracert
nslookup
netstat
ipconfig
Which domain name would be an example of a top-level domain?
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
The configuration is held by the server to be reissued when the PC is returned.
The configuration is permanent and nothing changes.
The address is returned to the pool for reuse when the lease expires.
The address is returned to the pool for reuse when the lease expires.
When planning for network growth, where in the network should packet captures take place to assess network traffic?
on as many different network segments as possible
only on the busiest network segment
between hosts and the default gateway
on as many different network segments as possible
A wireless host needs to request an IP address. What protocol would be used to process the request?
Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that was written to look like a video game
When applied to a router, which command would help mitigate brute-force password attacks against the router?
service password-encryption
login block-for 60 attempts 5 within 60*
banner motd $Max failed logins = 5$
exec-timeout 30
login block-for 60 attempts 5 within 60*
A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?
show ip interface brief
show interfaces
show mac-address-table
Where are Cisco IOS debug output messages sent by default?
memory buffers
vty lines
console line
Syslog server
Match the description with the associated IOS mode. (not all options are used.)
pytanie 74
Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)
pytanie 75