Network Pro Ch 1

Your page rank:

Total word count: 1589
Pages: 6

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

You have implemented a network where hosts are assigned specific roles, such as for file sharing and rpinting. Other hosts access those resources but do not host services of their own. What type of network do you have?
A Internet
B Peer-to-peer
C Client/Server
D Extranet

C Client/Server

You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?
A Polling
B Peer-to-Peer
C Mulitple access
D Client/Server

B Peer-to-Peer

Which of the following topologies connects each network device to a central hub?
A Ring
B Bus
C Mesh
D Star

D Star

You have a small network that uses a hub to connect multiple devices. What physical topology is used?
A Star
B Mesh
C Ring
D Bus

D Star

In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device?
A Bus
B Ring
C Tree
D Star

B Ring

You have been asked to implement a network infrastructure that will accomadate failed connections. Whcih of the following network topologies provides redundancy for a failed link?
A Mesh
B Bus
C Ring
D Star

A Mesh

You have a network that uses a logical rinf topology. How do messages travel through the network?
A Messages travel from one device tot he next until they reach the destination.
B Messages are sent to a central device which then forwards the message to the destination.
C Messages are sent directly to the destination.
D Messages are sent to all devices connected to the network.

A Messages travel from one device tot he next until they reach the destination.

Which of the following topologies connects all devioces to a trunk cable?
A Tree
B Bus
C Ring
D Star

B Bus

What device is used to create a physical star topology?
A Bridge
B Firewall
C Router
D Switch

D Switch

You have a network that uses a logical bus topology. How do messages travel through the network.
A Messages travel from one device to the next until they reach the destination device.
B Messages are sent directly to the correct destination device.
C Messages are broadcast to all devices connected to the network.
D Messages are sent to a central device which then forwards the message to the destination device.

C Messages are broadcast to all devices connected to the network.

You want to implement a fault tolerant topology as you interconnect routers on your wide area netowrk. Which of the following would meet your needs?
A Bus
B Ring
C Mesh
D Star

C Mesh

Which of the following topologies connects each device to a neighboring device?
A Star
B Tree
C Ring
D Bus

C Ring

You have implemented an ad-hoc wireless network that doesnt employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical topology has been implemented in this type of network?
A Ring
B Tree
C Bus
D Star
E Mesh

E Mesh

What protocol sends email to a mail server?
A SNMP
B SMTP
C POP3
D FTP
E TFTP

B SMTP

You have a large TCP/IP network and want to keep hosts real time clocks syncronized. What protocol should you use?
A NTP
B SAP
C SNMP
D SMTP
E NNTP

A NTP

Your company has just acquired another comapany in the same city. You are given the task of integrating the two email systems so that messages can be exchanged between the email servers. However, each network uses an email package froma different vendor.
Which TCP/IP protocol will enable messages to be exchanged between systems?
A FTP
B SMTP
C IMAP4
D ICMP
E POP3

B SMTP

Which protocol is used on the world wide web to transmit web pages to web browsers?
A NNTP
B HTTP
C HTML
D SMTP

B HTTP

You want to transfer a file from a Unix server to a windows 2000 computer. Which of the following utilities could you use to do this? Select all that apply.
FTP
Tracert
Netstat
NBSTAT
Telnet
TFTP

FTP TFTP

You want to allow your users to download files form a server runing the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability?
A HTML
B TCP
C FTP
D HTTP
E IP
F TFTP

C FTP

Which of the following protocols stores email on the mail server and gives a choice to download mail or keep it on the server?
A NTP
B SMTP
C POP3
D IMAP4

D IMAP4

Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server?
A POP3
B SMTP
C FTP
D SPC
E SNMP

A POP3

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
A TCP
B ARP
C ICMP
D IGMP
E DHCP
F IP

C ICMP

You are asked to recommend an email retieval protocol for a company’s sales team. The sales team needs to access email from various locations and possibly different computers. the sales team does not want to worry about transferring email messages or files back and forth between these computers.
Which email protocol was designed for this purpose?
A SMTP
B POP4
C POP3
D MFTP
F IMAP

F IMAP Internet Message Access Protocol

The data link layer of the OSI model is compromised of two sublayers. Waht are they?
A LAT
B DLC
C MAC
D SAN
E LLC

C MAC E LLC

In the OSI model, which of the following functions are performed at the Application layer? Select all that apply.
A Data translation
B Conversion identification
C Enabling communication between network clients and services
D Integration of network functionality into the host operating system

C Enabling communication between network clients and services D Integration of network functionality into the host operating system

Which three of the following functions are performed by the OSI Transport layer?
A Reliable message delivery
B Consistent data formatting between disimiliar systems
C Control media access, logical topology, and device identification
D Format packets for delivery
E Path indentification and selection
F End-to-end flow control
G Data segmentation and reassembly

A Reliable message delivery F End-to-end flow control G Data segmentation and reassembly

You are an application developer and are writing a program to exchange video files through TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?
A TFPT
B RIP
C FTP
D UDP
E TCP
F IP

E TCP

Which of the following are functions of the MAC sublayer? Select two.
A Creating routing tables based on MAC addresses
B Defining a unique hardware address for each device on the network
C Letting devices on the network have access to the LAN
D Mapping hardware addresses to link-layer addresses

B Defining a unique hardware address for each device on the network C Letting devices on the network have access to the LAN

In the OSI model, what is the primary function of the Network Layer?
A Allows applications to establish, use, and end a connection
B Routes messages between networks
C Transmits data frames
D Ensures that packets are delivered with no loss or duplication

B Routes messages between networks

The UDP tansport protocol provides which of the following features? select all that apply.
A Gauranteed delivery
B Connectionless datagram services
C Low overhead
D Sequence numbers and acknowledgements

B Connectionless datagram services C Low overhead

Whcih OSI model layer is responsible for guaranteeing reliable message delivery?
A Application
B Data link
C Transport
D Session

C Transport

Which of the following functions are performed at the Physical layer of the OSI model?
A Enablement of netowork services
B Movement of data across network cables
C Conversation identification
D Provision of an environment in which to run network applications
E Data translation

B Movement of data across network cables

What is the basic purpose of the OSI Physical Layer?
A Coordinates rules for managing network servers.
B Defines basic physical structures, such as disks.
C Coordinates rules for transmitting bits.
D Coordinates rules for routing packets.

C Coordinates rules for transmitting bits.

Which of the following tasks is associated with the Session layer?
A Host ID number assignment
B Acknowledge coordination
C Transmission syncronization
D Connection establishment

D Connection establishment

Which two of the following are included as part of Data Link layer specifications?
A Syncronizing individual bits as they are transmitted through the network.
B Identifying physical network devices.
C Compostion of elctrical signals as they pass through the transmissionmedium.
D Controlling how messgaes are propagated through the network.

B Identifying physical network devices. D Controlling how messgaes are propagated through the network.

In the OSI model, which of the following functions are performed at the Presentation layer? select two.
A Maintain sperate client connections
B Specify data format
C Encrypt and compress
D Provide network services
E Transmit data frames
F Handle general network access, flow control, and rror recovery

B Specify data format C Encrypt and compress

Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?
A UDP
B UCP
C TCP
D UDB

C TCP

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending