NETWORKING EXAM 1 (CH 1-3)
QUESTIONS WITH COMPLETE
SOLUTIONS
Which of the following is not one of the disadvantages of peer-to-peer networks? -
Answer-They centralize user account logins
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? - Answer-
Network
In considering the responsibilities of each layer of the OSI model, what statement
accurately reflects those of the Presentation layer? - Answer-The Presentation layer is
responsible for reformatting, compressing, and/or encrypting data in a way that the
application on the receiving end can read
Which of the following is an example of encapsulation? - Answer-The addition of a
header to data inherited from the layer above in the OSI model.
What mail protocol is used to send mail messages to a server? - Answer-SMTP
What is the most popular web server application? - Answer-Apache
The TCP and UDP protocols both exist at what layer of the OSI model? - Answer-
Transport
The frame header at the Data Link layer includes hardware addresses of the source and
destination NICs. What is another name for this address? - Answer-MAC (Media Access
Control) address
In the TCP/IP model, what layer is considered so simple that it is ignored entirely -
Answer-Physical
What federal agency is charged with safety and health in the workplace? - Answer-
Occupational Safety and Health Administration (OSHA)
What is the minimal amount of voltage required to damage an electrical component? -
Answer-10 volts
When dealing with static electricity, what kind of failure caused by static discharge
shortens the life of a component, and can cause intermittent errors? - Answer-upset
failure
, In the TCP/IP model, what layer combines the responsibilities of the Application,
Presentation, and Session layers from the OSI model? - Answer-Application
What occurs if a network layer protocol is aware that a packet is larger than the
maximum size for its network? - Answer-The packet will be divided into smaller packets
using fragmentation.
In a fire suppression system, what term is used to describe what is typically a foaming
chemical, gas, or water that is sprayed everywhere to put out a fire? - Answer-fire
suppression agent
In the United States, who is able to activate the Emergency Alert System at the national
level? - Answer-The President
What is assigned to each node on a network, which is then used by the Network layer to
uniquely identify the node? - Answer-IP address
What Application layer protocol can be used to monitor and gather information about
network traffic and can alert network administrators about adverse conditions that need
attention? - Answer-SNMP
The Windows Remote Desktop application utilizes what protocol to provide secure,
encrypted transmissions? - Answer-Remote Desktop Protocol (RDP)
In a domain, the process of allowing a user to sign on to the network from any computer
on the network and get access to resources is managed by what service? - Answer-
Active Directory Domain Services (AD DS)
Each type of cable has a prescribed bend radius, which is the radius of the maximum
arc into which you can loop a cable without impairing data transmission. - Answer-True
The TIA/EIA standard for wall jacks in a work area require that at least one outlet be
provided for data and one for voice. - Answer-True
Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use
in plenum areas. - Answer-False
The industry standard height for a rack in rack units is 42U - Answer-True
A 66 block is more suitable for data connections than the older 110 block. - Answer-
False
Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber
(MMF). - Answer-True
QUESTIONS WITH COMPLETE
SOLUTIONS
Which of the following is not one of the disadvantages of peer-to-peer networks? -
Answer-They centralize user account logins
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? - Answer-
Network
In considering the responsibilities of each layer of the OSI model, what statement
accurately reflects those of the Presentation layer? - Answer-The Presentation layer is
responsible for reformatting, compressing, and/or encrypting data in a way that the
application on the receiving end can read
Which of the following is an example of encapsulation? - Answer-The addition of a
header to data inherited from the layer above in the OSI model.
What mail protocol is used to send mail messages to a server? - Answer-SMTP
What is the most popular web server application? - Answer-Apache
The TCP and UDP protocols both exist at what layer of the OSI model? - Answer-
Transport
The frame header at the Data Link layer includes hardware addresses of the source and
destination NICs. What is another name for this address? - Answer-MAC (Media Access
Control) address
In the TCP/IP model, what layer is considered so simple that it is ignored entirely -
Answer-Physical
What federal agency is charged with safety and health in the workplace? - Answer-
Occupational Safety and Health Administration (OSHA)
What is the minimal amount of voltage required to damage an electrical component? -
Answer-10 volts
When dealing with static electricity, what kind of failure caused by static discharge
shortens the life of a component, and can cause intermittent errors? - Answer-upset
failure
, In the TCP/IP model, what layer combines the responsibilities of the Application,
Presentation, and Session layers from the OSI model? - Answer-Application
What occurs if a network layer protocol is aware that a packet is larger than the
maximum size for its network? - Answer-The packet will be divided into smaller packets
using fragmentation.
In a fire suppression system, what term is used to describe what is typically a foaming
chemical, gas, or water that is sprayed everywhere to put out a fire? - Answer-fire
suppression agent
In the United States, who is able to activate the Emergency Alert System at the national
level? - Answer-The President
What is assigned to each node on a network, which is then used by the Network layer to
uniquely identify the node? - Answer-IP address
What Application layer protocol can be used to monitor and gather information about
network traffic and can alert network administrators about adverse conditions that need
attention? - Answer-SNMP
The Windows Remote Desktop application utilizes what protocol to provide secure,
encrypted transmissions? - Answer-Remote Desktop Protocol (RDP)
In a domain, the process of allowing a user to sign on to the network from any computer
on the network and get access to resources is managed by what service? - Answer-
Active Directory Domain Services (AD DS)
Each type of cable has a prescribed bend radius, which is the radius of the maximum
arc into which you can loop a cable without impairing data transmission. - Answer-True
The TIA/EIA standard for wall jacks in a work area require that at least one outlet be
provided for data and one for voice. - Answer-True
Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use
in plenum areas. - Answer-False
The industry standard height for a rack in rack units is 42U - Answer-True
A 66 block is more suitable for data connections than the older 110 block. - Answer-
False
Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber
(MMF). - Answer-True