Janet Ross Willi
Quiz by , created more than 1 year ago

mobility study questions 1-20

111
0
0
Janet Ross Willi
Created by Janet Ross Willi about 9 years ago
Close

Mobility - (Questions 1-20)

Question 1 of 20

1

Which layer of the OSI model is tasked with carrying electrical impulses across media?

Select one of the following:

  • network layer

  • physical layer

  • data link layer

  • transport layer

Explanation

Question 2 of 20

1

You are trying to explain the layers of the OSI model to a colleague. Which two layers deal with logical and physical addressing? (choose two)

Select one or more of the following:

  • network layer

  • physical layer

  • transport layer

  • data link layer

Explanation

Question 3 of 20

1

You are looking at a network traffic log and see TCP connections that use the SYN, SYN/ACK, and ACK flags set. What type of communication is this?

Select one of the following:

  • UDP datagram traffic

  • File transfer over FTP

  • TCP three-way handshake

  • Encryption traffic over SSI

Explanation

Question 4 of 20

1

Which of the following layers of the OSI model use data as their Protocol Data Units? (choose two)

Select one or more of the following:

  • transport layer

  • application layer

  • presentation layer

  • data link layer

Explanation

Question 5 of 20

1

Which of the following layers is concerned with changing the format of data into something that the layer above it and the layer below it can understand.?

Select one of the following:

  • application layer

  • presentation layer

  • session layer

  • transport layer

Explanation

Question 6 of 20

1

You are teaching a class on the OSI model, and one of the students has a question about how the TCP/IP protocol stack maps to the OSI model. Which of the following best describes the mapping of the TCP/IP layers to the OSI model layers?

Select one of the following:

  • TCP/IP is a four-layer stack that maps well to the OSI seven-layer model.

  • The top two layers of TCP/IP map to the top three layers of the OSI model.

  • The bottom two layers of the OSI model map directly to the bottom two layers of the TCP/IP protocol stack.

  • None of the TCP/IP protocol stack layers map directly to any of the OSI model layers.

Explanation

Question 7 of 20

1

Which of the following transport layer protocols is not concerned with connection establishment, error correction, or flow control?

Select one of the following:

  • Internet Protocol (IP)

  • File Transfer Protocol (FTP)

  • Transport Control Protocol (TCP)

  • User Datagram Protocol (UDP)

Explanation

Question 8 of 20

1

Which layer in the TCP/IP protocol stack is concerned with routing and logical addressing?

Select one of the following:

  • Link layer

  • Internet layer

  • application layer

  • transport layer

Explanation

Question 9 of 20

1

As a junior-level network technician, you are asked to build a simple network, connecting just a few hosts together. None of the them are dedicated servers, and they are all equal in the network in terms of function. They also must each have their own security requirements, such as usernames and passwords, that aren't shared between them. What is the best network to design that meets these requirements?

Select one of the following:

  • centralized network

  • N-tier architecture

  • client-server architecture

  • peer-to-peer network

Explanation

Question 10 of 20

1

Your server is pushing app notifications to your iOS devices, but you receive some messages back that indicate that the notifications failed for various reasons. Which protocol would have sent those failure notifications back to your server?

Select one of the following:

  • SRP

  • APNs Failure

  • APNs Return

  • APNs Feedback

Explanation

Question 11 of 20

1

You are reviewing your network logs and see a high amount of traffic using TCP port 3389. What kind of connections could account for this traffic?

Select one of the following:

  • Remote connections to Windows hosts

  • Device updates from a BlackBerry Enterprise Server

  • Remote connections to Linux hosts

  • Apple push notifications to iOS devices

Explanation

Question 12 of 20

1

Which two ports are valid for Simple Mail Transfer Protocol (SMTP) and Alternate SMTP? (choose two)

Select one or more of the following:

  • TCP port 25

  • TCP port 110

  • UDP port 587

  • TCP port 587

Explanation

Question 13 of 20

1

You are trying to minimize the number of protocols used on the network that don't communicate securely. Which one of the following protocols should you review for switching to a secure alternative?

Select one of the following:

  • SSH

  • SMTP

  • SSL

  • FTP

Explanation

Question 14 of 20

1

Which of the following mobile devices would you expect to use TCP port 2195 for its updates?

Select one of the following:

  • BlackBerry Curve

  • Apple iPhone

  • Android

  • Windows phone

Explanation

Question 15 of 20

1

Which of the following protocols offer some level of encryption and authentication for network traffic that uses it?

Select one of the following:

  • FTP

  • Telnet

  • SSH

  • HTTP

Explanation

Question 16 of 20

1

All of the following are protocols that are routinely used over SSL to provide enhanced security EXCEPT:

Select one of the following:

  • HTTP

  • SMTP

  • DNS

  • IMAP

Explanation

Question 17 of 20

1

Which of the following protocols provides for automatic assignment of IP addressing information to network hosts?

Select one of the following:

  • DHCP

  • DNS

  • SSH

  • SMTP

Explanation

Question 18 of 20

1

DNS uses which of the following port and protocol combinations (choose two)

Select one or more of the following:

  • UDP port 67

  • TCP port 53

  • UDP port 68

  • UDP port 53

Explanation

Question 19 of 20

1

You are looking at a network log file that shows communications between a client and a web server. You see that two ports were in use during the communications session, port 50123 and port 80. Which port would be the source and which port the destination when the client is sending a request to the web server? (choose two)

Select one or more of the following:

  • Destination port: 80

  • Source port: 50123

  • Source port: 80

  • Destination port: 50123

Explanation

Question 20 of 20

1

You have configured an FTP server to listen on a non-standard port, TCP port 3135. When you try to test the connection using FTP client software from another host, the connection fails. Assuming there's no other problem with the connection to the server, what should you do to complete the configuration so that clients can connect to the new FTP service on the correct port?

Select one of the following:

  • Configure the client software to connect using TCP port 3135.

  • Configure the client software to connect using UDP port 3135.

  • Configure the client software to connect using TCP port 21.

  • Reboot the FTP server.

Explanation