Flashcards
Operating systems and networks - Set 1
Flashcards for quick repetition. Test your networks and operating systems knowledge.
Flashcards: 124
Played: 3883 times
Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)
What is one difference between the client-server and peer-to-peer network models?
A peer-to-peer network transfers data faster than a transfer using a client-server network.
Every device in a peer-to-peer network can function as a client or a server
A data transfer that uses a device serving in a client role requires that a dedicated server be present.
Only in the client-server model can file transfers occur.
Every device in a peer-to-peer network can function as a client or a server
What is the function of the HTTP GET message?
to retrieve client email from an email server using TCP port 110
to send error information from a web server to a web client
to request an HTML page from a web server
to request an HTML page from a web server
Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?
client/server
peer-to-peer
master-slave
point-to-point
What network service resolves the URL entered on a PC to the IP address of the destination server?
A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?
a change in the amount of RAM according to the show version output
a change in the bandwidth according to the show interfaces output
a next-hop timeout from a traceroute an increase in host-to-host ping response times
a next-hop timeout from a traceroute an increase in host-to-host ping response times
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?
URL filtering
packet filtering
application filtering
stateful packet inspection
stateful packet inspection
What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?
The computer receives an IP address that starts with 169.254
The computer cannot ping other devices on the same network with IP addresses in the 169.254.0.0/16 range.
The computer cannot ping 127.0.0.1.
The computer receives an IP address that starts with 169.254
Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?
terminal monitor*
logging console
logging buffered
logging synchronous
terminal monitor
logging buffered
logging console
Fill in the blank.
During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a ........ message.
multicast
broadcast
unicast
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?
leased line
dialup
satellite
cable modem
DSL
What is the purpose of having a converged network?
to achieve fault tolerance and high availability of data network infrastructure devices
to reduce the cost of deploying and maintaining the communication infrastructure
to provide high speed connectivity to all end devices
to make sure that all types of data packets will be treated equally
to reduce the cost of deploying and maintaining the communication infrastructure
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
reliability
scalability*
quality of service
accessibility
scalability
reliability
accessibility
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?
ROM
flash
the configuration register
NVRAM
a TFTP server
Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?
120
What are three characteristics of an SVI? (Choose three.)
It is designed as a security protocol to protect switch ports.
It is associated with VLAN1 by default.
It provides a means to remotely manage a switch.
It is required to allow connectivity by any device at any location.
It is a special interface that allows connectivity by different types of media.
It is not associated with any physical interface on a switch.
It is associated with VLAN1 by default.
It provides a means to remotely manage a switch.
It is not associated with any physical interface on a switch.
A technician configures a switch with these commands:SwitchA(config)# interface vlan 1
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdownWhat is the technician configuring?
Telnet access
SVI
password encryption
physical switchport access
SVI
Telnet access
physical switchport access
password encryption
In computer communication, what is the purpose of message encoding?
to convert information to the appropriate form for transmission*
to break large messages into smaller frames
to negotiate correct timing for successful communication
to convert information to the appropriate form for transmission*
What is a characteristic of multicast messages?
They are sent to a select group of hosts.
They must be acknowledged.
They are sent to a single destination.
They are sent to a select group of hosts.