ICT 220 Chapter 1 Review Questions Jeremy Green PDF

Title ICT 220 Chapter 1 Review Questions Jeremy Green
Author Jeremy Green
Course Networking Fundamentals
Institution College of the Sequoias
Pages 5
File Size 57.7 KB
File Type PDF
Total Downloads 95
Total Views 127

Summary

ICT 220 Chapter 1 Review Questions (Answers)...


Description

Jeremy Green ICT 220 Chapter 1 Review

Chapter 1 Review Questions 1) In the client-server model, what is the primary protocol used for communication between a browser and web server? a) FTP b) TCP c) HTTP d) SSL HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted. 2) Which two encryption protocols might be used to provide secure transmissions for browser and web server communications? a) HTTP and HTTPS b) SSL and TLS c) SSL and HTTP d) TCP and UDP Transport Layer Security, and its now-deprecated predecessor, Secure Sockets Layer, are cryptographic protocols designed to provide communications security over a computer network. 3) Which email protocol allows an email client to download email messages to the local computer? a) IMAP4 b) SMTP c) TCP d) POP3 a protocol for receiving email by downloading it to your computer from a mailbox on the server of an Internet service provider. 4) Which email protocol allows an email client to read mail stored on the mail server? a) IMAP4 b) SMTP c) TCP d) POP3 Internet Message Access Protocol 4 is A programming interface (API) from the IETF that enables a user's email program to access the mail server

Jeremy Green ICT 220 Chapter 1 Review

5) Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? a) Telnet b) Remote Desktop c) SFTP d) SSH Microsoft currently refers to their official RDP client software as Remote Desktop Connection, formerly "Terminal Services Client". 6) A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use? a) Star-bus b) Ring c) Hybrid d) Peer-to-peer denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central server. 7) In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support without the upgrade? a) Hybrid b) Client-server c) Star-bus d) Ring a computer system in which a central server provides data to a number of networked workstations. 8) A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? a) Hybrid b) Mesh c) Star-bus d) Star A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.

Jeremy Green ICT 220 Chapter 1 Review

9) In Question 8, suppose a new switch is connected to the first switch by way of a network cable, and three computers are connected to the new switch. Which network topology is now used? a) Hybrid b) Mesh c) Star-bus d) Star A star bus network is a combination of a star topology (like most Ethernet switches today) and a bus network, as in the older networks that ran over twinax or coax. 10) Which type of address is used at the Transport layer to identify the receiving application? a) IP address b) Port c) MAC address d) Protocol The TCP/IP protocol supports two types of port- TCP Port and UDP Port. 11) What is the name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network? Active Directory Active Directory is a directory service developed by Microsoft for Windows domain networks. 12) What is the fundamental distinction between a Layer 2 switch and a router? switch belongs only to one network router belongs to more than one network A layer 2 switch is a type of network switch or device that works on the data link layer (OSI Layer 2) and utilizes MAC Address to determine the path through where the frames are to be forwarded. 13) What is the fundamental distinction between a node and a host? host is a computer that hosts a resource on the network node is any computer that can be addressed on the network A node is any addressable device connected to a network whereas the host is a more specific descriptor that refers to a networked general-purpose computer rather than a single purpose device 14) What is the fundamental distinction between a MAN and a WAN?

Jeremy Green ICT 220 Chapter 1 Review

WANs expand over a larger geographical area than MANs A MAN (metropolitan area network) is a larger network that usually spans several buildings in the same city or town. A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. 15) What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work? segment; datagram; Layer 4: Transport Layer A message delivered by TCP is considered connection-oriented and one delivered via UDP is considered connectionless or best-effort. These protocols operate at the Transport Layer (Layer 4) 16) At the Network layer, what type of address is used to identify the receiving host? IP address An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. 17) At the Data Link layer, which type of network address is used to identify the receiving node? MAC address media access control address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment. 18) A computer is unable to access the network. When you check the LED lights near the computer’s network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work? Layer 1: Physical Layer or the Layer 2: Data Link Layer The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. 19) A user complains that he cannot access a particular website, although he is able to access other websites. At which layer of the OSI model should you begin troubleshooting this problem? Layer 7: Application Layer

Jeremy Green ICT 220 Chapter 1 Review

An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. 20) A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you begin troubleshooting? Which OSI layer is responsible for not dropping the Skype connection? Layer 5: Session Layer, Layer 7: Application Layer The session layer provides the mechanism for opening, closing and managing a session between end-user application processes, i.e., a semi-permanent dialogue....


Similar Free PDFs