F5 Application Delivery Fundementals (101) - Section 1 - OSI

Description

101 - Application Delivery F5 (101 - Application Delivery) Quiz on F5 Application Delivery Fundementals (101) - Section 1 - OSI , created by Christopher Griffin on 20/11/2016.
Christopher Griffin
Quiz by Christopher Griffin, updated more than 1 year ago
Christopher Griffin
Created by Christopher Griffin about 8 years ago
100
1

Resource summary

Question 1

Question
What does OSI stand for?
Answer
  • Open System Interconnection
  • Overlay standard industry
  • Open standard industry
  • Overlay system interconnection

Question 2

Question
What layer is not part of the OSI model upper layers?
Answer
  • The Application Layer
  • The Network Layer
  • The Presentation Layer
  • The Session Layer

Question 3

Question
What are the OSI model lower layers?
Answer
  • Transport Layer, Network Layer, Data-Link Layer, and Physical Layer
  • Application Layer, Presentation Layer, and Physical Layer
  • Data-Link Layer, Network Layer, Session Layer, Application Layer

Question 4

Question
What are the roles of the application layer?
Answer
  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).
  • Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand
  • Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts
  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).

Question 5

Question
What are the roles of the presentation layer?
Answer
  • Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts
  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).
  • Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand
  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).

Question 6

Question
What are the roles of the Transport Layer?
Answer
  • Takes the data from each application, and integrates it all into a single stream maintaining flow control
  • Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer
  • Establish a session with the receiving host;sessions are established between applications
  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).

Question 7

Question
What are the roles of the session Layer?
Answer
  • Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand
  • Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer
  • Establish a session with the receiving host; sessions are established between applications
  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).

Question 8

Question
What are the roles of the Network Layer?
Answer
  • Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts
  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).
  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).
  • Establish a session with the receiving host;sessions are established between applications

Question 9

Question
What are the roles of the Data Link Layer?
Answer
  • Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand
  • Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer
  • Takes the data from each application, and integrates it all into a single stream maintaining flow control
  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).

Question 10

Question
What are the roles of the Physical Layer?
Answer
  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).
  • Establish a session with the receiving host; sessions are established between applications
  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).
  • Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer

Question 11

Question
Provides application services for file transfers, e-mail, and other network software services.
Answer
  • Application Layer
  • Presentation Layer
  • Network Layer
  • Physical Layer

Question 12

Question
This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Answer
  • Presentation Layer
  • Application Layer
  • Network Layer
  • Physical Layer

Question 13

Question
Responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Answer
  • Session Layer
  • Application Layer
  • Transport Layer
  • Physical Layer

Question 14

Question
Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Answer
  • Physical Layer
  • Network Layer
  • Presentation Layer
  • Transport Layer

Question 15

Question
Provides error-free transfer of data frames from one node to another over the physical layer.
Answer
  • Transport Layer
  • Application Layer
  • Session Layer
  • Data-Link Layer

Question 16

Question
What are the address types at Layer 1
Answer
  • Hubs, Repeaters, Cables
  • TCP, SPX and UDP
  • Twisted Pair Cable and Connectors
  • IPv4, IPV6, IPX

Question 17

Question
What are the two sublayers of Layer2
Answer
  • Media Access Control (MAC) layer
  • Open System Interconnection (OSI)
  • 802.3u
  • Logical Link Control (LLC) layer

Question 18

Question
What are the address types at Layer 2
Answer
  • 802.11 (WLAN), Wi-Fi, WiMAX
  • TCP, SPX and UDP
  • SSL, WEP, WPA
  • SONET/SDN,Coaxial Cable, Twisted Pair Cable

Question 19

Question
What are the address types at Layer 3
Answer
  • TCP, SPX and UDP
  • OSPF, ICMP, IGMP and ARP
  • SNMP, SSH, TELNET and NTP
  • Logical Ports 21, 22, 23, 80 etc

Question 20

Question
What are the address types at Layer 4
Answer
  • TCP, SPX and UDP
  • DHCP, DNS, FTP, HTTP
  • Optical Fiber, SONET/SDN,Coaxial Cable
  • IPv4, IPV6, IPX

Question 21

Question
What are the address types at Layer 5
Answer
  • Ethernet, Token Ring, Frame Relay, PPTP, L2TP and ISDN
  • Logical Ports 21, 22, 23, 80 etc.
  • SSL, WEP, WPA, Kerberos,
  • ICMP, IGMP and ARP

Question 22

Question
What are the address types at Layer 6
Answer
  • SSL, WEP, WPA, Kerberos,
  • IPv4, IPV6, IPX,
  • Frame Relay, PPTP, L2TP and ISDN
  • DHCP, DNS, FTP, HTTP

Question 23

Question
What are the address types at Layer 7
Answer
  • Hubs, Repeaters, Cables, Optical Fiber,
  • IPv4, IPV6, IPX, OSPF, ICMP, IGMP and ARP
  • Twisted Pair Cable and Connectors
  • DHCP, DNS, FTP, HTTP

Question 24

Question
What is the purpose of address resolution protocol (ARP)
Answer
  • used to locate the Ethernet address associated with a desired IP address
  • the area of the computer network that consists of every single computer
  • special broadcast address consisting of all used to send frames to all devices on the network
  • virtual broadcast domain created inside a switch

Question 25

Question
How many bytes are comprised in an hardware address (MAC address)?
Answer
  • 6 Bytes
  • 4 Bytes
  • 48 Bits
  • 128 Bytes

Question 26

Question
LACP is a protocol that detects error conditions on member links and redistributes traffic to other member links, thus preventing any loss of traffic on the failed link.
Answer
  • True
  • False

Question 27

Question
How many bits are dedicated to organization unique identifier (OUI)?
Answer
  • 24 bits
  • 24 Bytes
  • 3 octets

Question 28

Question
What is the "I/G" bit in the hardware address?
Answer
  • signifies whether the hardware address represents an individual device or a group of devices
  • resolves MAC addresses into IP addresses.
  • signifies support for half duplex Ethernet adds frame bursting and carrier extension

Question 29

Question
BIG-IP system uses a what technology to distribute traffic across multiple links. What is the process?
Answer
  • Multi-Port
  • Trunk
  • logical link
  • BIG Links

Question 30

Question
BIG IP assigns MAC address from the lowest-numbered interface of the trunk.
Answer
  • True
  • False

Question 31

Question
BIG-IP uses what trunk protocol?
Answer
  • ISL
  • LACP
  • None
  • VTP

Question 32

Question
Indicates the cost of using a route, which is typically the number of hops to the IP destination.
Answer
  • Metric
  • Gateway
  • Interface
  • VLAN

Question 33

Question
The IP address that the local host uses to forward IP datagrams to other IP networks.
Answer
  • Gateway
  • Interface
  • Metric

Question 34

Question
Routing protocols perform several activities, including:
Answer
  • Network discovery
  • Updating and maintaining routing tables
  • Frame Filtering
  • ARP

Question 35

Question
Remote networks are added to the routing table in two ways:
Answer
  • By the network administrator manually configuring static routes.
  • By implementing a dynamic routing protocol.
  • By waiting for application to tell the network about IP address
  • By email from host to host

Question 36

Question
Select dynamic routing protocols:
Answer
  • OSPF
  • IS-IS
  • Static routing
  • IGP
  • BGP

Question 37

Question
Fragmentation happens when a large IP datagram has to travel through a network with a maximum transmission unit (MTU) that is smaller than the size of the IP datagram.
Answer
  • True
  • False

Question 38

Question
How are the packets reassembled?
Answer
  • TCP performs reassembly
  • On the receiving end host using fragment ID
  • packets stay connected during transmission
  • application layer assembles the packets for viewing

Question 39

Question
The maximum TTL value is _________.
Answer
  • 255
  • 64
  • 1
  • no TTL exist in packets

Question 40

Question
What transmission technology is used for fragmentation of datagrams?
Answer
  • VLAN
  • MTU
  • ARP
  • MSS

Question 41

Question
Which of the types is not a unicast IPv6 unicast addresses?
Answer
  • Global-Unicast
  • Multicast
  • Link-Local Address
  • Unique Local Address
  • Loopback Address

Question 42

Question
IPv6 multicast is routable, and routers will not forward multicast packets unless there are members of the multicast groups to forward the packets to.
Answer
  • True
  • False

Question 43

Question
An anycast address is a single address assigned to a single nodes.
Answer
  • True
  • False

Question 44

Question
IPv6 address is comprised of ________ blocks of ______ bits?
Answer
  • 8 Blocks
  • 16 Blocks
  • 128 Bits
  • 64 Bits

Question 45

Question
What are the terms commonly referred in a "Three-way handshake"
Answer
  • ACK, or acknowledgment
  • SYN (synchronization) flag
  • FIN ACK, or Finish acknowledgment
  • SYN Ready

Question 46

Question
What is common maximum TCP "MTU" packet size for TCP packet?
Answer
  • The MTU for Ethernet, for instance, is 1500 bytes.
  • 1360 Bytes
  • 576 Bytes

Question 47

Question
During session connection establishment, two peers, or hosts, engage in negotiations to determine the IP segment size of packets that they will exchange during their communication.
Answer
  • MSS
  • MTU
  • ARP
  • UDP

Question 48

Question
What is an endpoint to a logical connection and the way a client program specifies a specific server program on a computer in a network?
Answer
  • Protocol Ports
  • logical Address
  • Ethernet addresses
  • VLAN

Question 49

Question
What are TCP RST Packets?
Answer
  • Reset Flags
  • TCP confirmation packets
  • TCP start packets for synchronization
  • No such packet

Question 50

Question
What are the three TCP Options?
Answer
  • Option-Kind
  • Option-SYN count
  • Option-Length
  • Option-Data

Question 51

Question
A web browser is an example of a ________.
Answer
  • user agent (UA)
  • server
  • host
  • user server (US)

Question 52

Question
HTTP is an application layer protocol designed within the framework of the Internet Protocol Suite.
Answer
  • True
  • False

Question 53

Question
HTTP request and response messages share similar message attributes, which are:
Answer
  • label maker request
  • an initial line
  • an optional message body
  • SMTP header

Question 54

Question
Define the initial line: GET /path/to/file/index.html HTTP/1.0
Answer
  • Initial Request Line
  • Initial Response Line
  • HTTP retrieval syntax
  • C+ Code

Question 55

Question
Define initial response line: HTTP/1.0 200 OK or HTTP/1.0 404 Not Found
Answer
  • Initial Request Line
  • Initial Response Line (Status Line)
  • Header Lines
  • HTTP web data packet

Question 56

Question
A message asks the server to return the response headers only, and not the actual resource (i.e. no message body).
Answer
  • POST Method
  • HEAD Method
  • Initial Response Line
  • Initial Request Line

Question 57

Question
A request is used to send data to the server to be processed in some way, like by a CGI script.; , block of data sent with the request, request URI is not a resource to retrieve, and HTTP response is normally program output, not a static file.
Answer
  • HTTP Keep-alives
  • HEAD Method
  • Initial Response Line
  • POST Method

Question 58

Question
Also called HTTP persistent connection, or HTTP connection reuse, is the idea of using a single TCP connection to send and receive multiple HTTP requests/responses, as opposed to opening a new connection for every single request/response pair.
Answer
  • HTTP Keep-alives
  • HTTP GET
  • SIP
  • DNS

Question 59

Question
Session Initiation Protocol (SIP) is a communications protocol used for communicating between different devices on a company network, whether on the LAN, the WAN, or across the Internet.
Answer
  • True
  • False

Question 60

Question
In FTP mode, the client connects from a random unprivileged port (N > 1023) to the FTP server’s command port, port 21.
Answer
  • Active
  • Passive
  • Random
  • RCP

Question 61

Question
client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an the connection, the client opens two random unprivileged ports locally (N > 1023 and N+1).
Answer
  • SMTP
  • Telnet
  • Passive FTP
  • RDP

Question 62

Question
Outlook Express connects to the SMTP server at mail.howstuffworks.com using port 53 ?
Answer
  • True
  • False

Question 63

Question
The SMTP server takes the address of the sender and the address of the recipient, as well as the body of the message. and breaks it into two parts:
Answer
  • recipient name
  • HTTP GET message
  • domain name
  • HTML code

Question 64

Question
SMTP Command: introduce yourself and request extended mode
Answer
  • RCPT TO
  • HELO
  • EHLO

Question 65

Question
List the common • [blank_start]HELO[blank_end] - introduce yourself • [blank_start]EHLO[blank_end] - introduce yourself and request extended mode • [blank_start]MAIL FROM:[blank_end] - specify the sender • [blank_start]RCPT TO:[blank_end] - specify the recipient
Answer
  • HELO
  • EHLO
  • MAIL FROM
  • RCPT TO

Question 66

Question
• [blank_start]DATA[blank_end] - specify the body of the message (To, From and Subject should be the first three lines.) • [blank_start]RSET[blank_end] - reset • [blank_start]QUIT[blank_end] - quit the session • [blank_start]HELP[blank_end] - get help on commands • [blank_start]VRFY[blank_end] - verify an address
Answer
  • DATA
  • RSET
  • QUIT
  • HELP
  • VRFY

Question 67

Question
allows a site to store state information on your machine
Answer
  • name-value pairs
  • cookie
  • message
  • EHOL

Question 68

Question
In HTTP version, what response status code gives NXX redirects the client to another URL ?
Answer
  • 1XX
  • 2XX
  • 3XX
  • 4XX
  • 5XX

Question 69

Question
In HTTP version, what response status code gives NXX indicates an error on the client’s part ?
Answer
  • 1XX
  • 2XX
  • 3XX
  • 4XX
  • 5XX

Question 70

Question
In HTTP version, what response status code gives NXX indicates an error on the server’s part ?
Answer
  • 1XX
  • 2XX
  • 3XX
  • 4XX
  • 5XX

Question 71

Question
What is SIP?
Answer
  • dedicated telephone line connection
  • communications protocol used for communicating between different devices on a company network
  • an ISDN connection

Question 72

Question
For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with
Answer
  • FTP- SSL/TLS
  • SSH File Transfer Protocol (“SFTP”)
  • TKIP
  • AES

Question 73

Question
a reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it.
Answer
  • URL
  • SIP
  • Logical Port
  • directory

Question 74

Question
a standard plain text data interchange format for representing LDAP (Lightweight Directory Access Protocol) directory content and update requests.
Answer
  • HTTP
  • LDIF
  • SOAP
  • REST
Show full summary Hide full summary

Similar

Definitions to Learn in Music
Rosa Brookes
Hitler and the Nazi Party (1919-23)
Adam Collinge
AQA GCSE Physics Unit 3.1
Matthew T
Chemistry Regents - Bonding Theories and Polar Bonds Notes
Ali Kane
SAT Sample Essay - Failure/ Success
nedtuohy
How Villainy is Depicted in Macbeth
scarletsnow491
Atomic Structure
Jenni
Art & Design in Context
Chloe Scott
Maths: Geometry
noajaho1
PSBD TEST 1
Mwebaze Green