Flashcards
Operating systems and networks - Set 1
Flashcards for quick repetition. Test your networks and operating systems knowledge.
Flashcards: 124
Played: 4000 times
Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)
What is one difference between the client-server and peer-to-peer network models?
A data transfer that uses a device serving in a client role requires that a dedicated server be present.
Every device in a peer-to-peer network can function as a client or a server
Only in the client-server model can file transfers occur.
A peer-to-peer network transfers data faster than a transfer using a client-server network.
Every device in a peer-to-peer network can function as a client or a server
What is the function of the HTTP GET message?
to send error information from a web server to a web client
to retrieve client email from an email server using TCP port 110
to request an HTML page from a web server
to request an HTML page from a web server
Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?
master-slave
point-to-point
peer-to-peer
client/server
What network service resolves the URL entered on a PC to the IP address of the destination server?
A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?
a change in the amount of RAM according to the show version output
a next-hop timeout from a traceroute an increase in host-to-host ping response times
a change in the bandwidth according to the show interfaces output
a next-hop timeout from a traceroute an increase in host-to-host ping response times
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?
application filtering
stateful packet inspection
URL filtering
packet filtering
stateful packet inspection
What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?
The computer receives an IP address that starts with 169.254
The computer cannot ping 127.0.0.1.
The computer cannot ping other devices on the same network with IP addresses in the 169.254.0.0/16 range.
The computer receives an IP address that starts with 169.254
Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?
terminal monitor*
logging console
logging buffered
logging synchronous
logging console
terminal monitor
logging buffered
Fill in the blank.
During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a ........ message.
unicast
multicast
broadcast
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?
dialup
satellite
cable modem
DSL
leased line
What is the purpose of having a converged network?
to provide high speed connectivity to all end devices
to make sure that all types of data packets will be treated equally
to achieve fault tolerance and high availability of data network infrastructure devices
to reduce the cost of deploying and maintaining the communication infrastructure
to reduce the cost of deploying and maintaining the communication infrastructure
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
reliability
scalability*
quality of service
accessibility
reliability
accessibility
scalability
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?
ROM
NVRAM
flash
the configuration register
a TFTP server
Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?
120
What are three characteristics of an SVI? (Choose three.)
It provides a means to remotely manage a switch.
It is required to allow connectivity by any device at any location.
It is a special interface that allows connectivity by different types of media.
It is associated with VLAN1 by default.
It is designed as a security protocol to protect switch ports.
It is not associated with any physical interface on a switch.
It provides a means to remotely manage a switch.
It is associated with VLAN1 by default.
It is not associated with any physical interface on a switch.
A technician configures a switch with these commands:SwitchA(config)# interface vlan 1
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdownWhat is the technician configuring?
Telnet access
SVI
password encryption
physical switchport access
physical switchport access
SVI
password encryption
Telnet access
In computer communication, what is the purpose of message encoding?
to negotiate correct timing for successful communication
to convert information to the appropriate form for transmission*
to break large messages into smaller frames
to convert information to the appropriate form for transmission*
What is a characteristic of multicast messages?
They are sent to a select group of hosts.
They are sent to a single destination.
They must be acknowledged.
They are sent to a select group of hosts.