Module 02: Networking Fundamentals Exam ECSS

Description

Module 02: Networking Fundamentals Exam ECSS
Alejandro López Villar
Quiz by Alejandro López Villar, updated more than 1 year ago
Alejandro López Villar
Created by Alejandro López Villar over 3 years ago
0
0
1 2 3 4 5 (0)

Resource summary

Question 1

Question
VE AL ENLACE SIGUIENTE PARA HACER EJERCICIOS DE CLASESD DE REDES https://create.kahoot.it/collection/a5099493-2d69-4610-988f-2487ccf14604 MIRA las notas para las clases.
Answer
  • True
  • False

Question 2

Question
CLASES DE REDES, MIRA EN ONE-NOTE LA EXPLICACIÓN DE LAS REDES ECCOUNCIL-MODULO 2 - REDES CLASES
Answer
  • True
  • False

Question 3

Question
[blank_start]Network[blank_end] is a cluster of computer hardware connected together physically or logica [blank_start]Networking[blank_end] describes the processes involve—gn designing, implementing, upgradirw managing of networks
Answer
  • Network
  • Networking
  • Network
  • Networking

Question 4

Question
networks may differ in many ways. For example: by size, by functions, by the geographical distance. LOCAL (LAN) [blank_start]<[blank_end] WIDE AREA NETWORK (WAN)[blank_start]>[blank_end]METROPOLITAN AREA NETWORK (MAN) [blank_start]LAN[blank_end] - home, office building, school, normalmente privada o de una organización [blank_start]WAN[blank_end] - conects 2 or more LAN over a public network . [blank_start]MAN[blank_end] - LAN are connected using fiber optical PERSONAL AREA NETWORK ([blank_start]PAN[blank_end]) Room-Size: Bluethooth, RF, NGC, etc CAMPUS AREA NETWORK ([blank_start]CAN[blank_end]) University GLOBAL AREA NETWORK ([blank_start]GAN[blank_end]) Combination different computer networks; Unlimited geographical area
Answer
  • <
  • >
  • <
  • >
  • LAN
  • WAN
  • MAN
  • LAN
  • WAN
  • MAN
  • LAN
  • WAN
  • MAN
  • PAN
  • CAN
  • PAN
  • CAN
  • PAN
  • GAN

Question 5

Question
NAT Mira la nota en ONE-NOTE acerca de como funciona una NAT. Básicamente la IP que sale al exterior es siempre la IP del GW y las IP de las LAN no salen, sino que cuando recibe la respuesta el GW sabe a qué IP dirigirlo
Answer
  • True
  • False

Question 6

Question
FIJATE EN LA RELACIÓN, RPÍTELO TANTAS VECES COMO NECESITES
Answer
  • NONE

Question 7

Question
FIJATE EN LOS PROTOCOLOS DE LAS CAPAS REPITE EL ESQUEMA MIRA EN
Answer
  • NONE
  • VVV

Question 8

Question
Capa que aseguran END TO END POINT tanto en OSI como en TCP/IP es siempre TRANSPORTE [blank_start]transporte[blank_end]
Answer
  • transporte
  • network

Question 9

Question
FUNCTIONS: User processes: telnet, FTP, Mail DEVICES: Gateaway Nerwork Device LAYER: [blank_start]Aplication[blank_end] FUNCTIONS: general functions por application, layer screen control, encryption DEVICES: Gateaway Redirector LAYER: [blank_start]Presentation[blank_end] FUNCTIONS: User interface, remote login, sessions etc DEVICES: Gateaway LAYER: [blank_start]Session[blank_end] FUNCTIONS: end-to-end, control, DEVICES: Brouter, cable tester LAYER: [blank_start]transport[blank_end] FUNCTIONS: Network management interface, routing, packet assembly DEVICES: Routers LAYER: [blank_start]Network[blank_end] FUNCTIONS: link management error, correction, flow control DEVICES: SW and hubs LAYER: [blank_start]Data Link[blank_end] FUNCTIONS: Physical hardaware, cables, signal levels DEVICES: Gabling, hubs LAYER: Physical
Answer
  • Aplication
  • Presentation
  • Session
  • Aplication
  • Presentation
  • Session
  • Sessionf
  • fff
  • Session
  • transport
  • Network
  • Network
  • Data Link
  • Network
  • Data Link

Question 10

Question
ESCRIBE EN MAYUSCULAS, EN CASO DE DOS, EL MÁS OBVIO PARA ESTUDIAR: LOS DEVICES DE CADA CAPA
Answer
  • HUBS
  • SWITCHES
  • ROUTERS
  • GATEAWAY
  • GATEAWAY
  • GATEAWAY REDIRECTOR
  • GATEAWAY NETWORK DEVICE

Question 11

Question
LO MISMO QUE EN EL ANTERIOR FIJATE LAS RELACIONES ENTRE LAS CAPAS Y COMO SE DENOMINA LOS DPU EN EL MODELO TCP/IP
Answer
  • MESSAGE - APPLICATION LAYER
  • PACKET - TRANSPORT LAYER
  • DATAGRAM - INTERNET LAYER
  • FRAME - NETWORK INTERFACE LAYER

Question 12

Question
Fijate la correlación: OSI, 7 layers 1,2,3,4,5,6,7 TCP/IP, 4 layers EQUIVALENCIAS 1 TCP = 1,2 OSI 2 TCP = 3 OSI 3 TCP = 4 OSI 4 TCP = 5,6,7 OSI
Answer
  • True
  • False

Question 13

Question
ESCRIBE EN UNA HOJA LO QUE SE VES AQUÍ PARA PODER MEMORIZAR LA RELACIÓN ENTRE LOS DOS MODELOS
Answer
  • NONE

Question 14

Question
ALGO QUE DEBES RECORDAR YA QUE LLEVA A CONFUSIÓN la capa de transporte , tanto en OSI como en TCP/IP es la encargada de asegurar el end to end point, no de enviar nada las capas que envían son, la de internet en TCP/IP (2) y en OSI Data link para redes locales , recuerda los SW la capa de network que usa los router para envíar paquetes a otras lan
Answer
  • True
  • False

Question 15

Question
EN EL MODELO TCP/IP RESPONSABLE CODING - [blank_start]APPLICATION LAYER[blank_end] MONITORS END TO END PATH - [blank_start]TRANSPORT LAYER[blank_end] CHARGE OF SENDING PACKETS - [blank_start]INTERNET LAYER[blank_end] CLOSEST LAYER TO HARDWARE - NETWORK INTERFACE LAYER
Answer
  • APPLICATION LAYER
  • TRANSPORT LAYER
  • INTERNET LAYER
  • TRANSPORT LAYER
  • APPLICATION LAYER
  • TRANSPORT LAYER
  • NETWORK INTERFACE LAYER
  • INTERNET LAYER

Question 16

Question
FIJATE EN LOS PROTOCOLOS Y EN LA RELACIÓN QUE EXISTE ENTRE LAS CAPAS Y LO QUE YA SABES. Por ejemplo, ti en la presentation layer se realiza la encriptación, tiene sentido que ahí esten los protocols de SSH y SSL/TSL NOTA HTPPS va en app layer aunque sea cifrado, SSH puede ir en app o presentation layer en network van todos los de routing y las de direccionies en datalink, los de wifi (802 tipo ) y los típicos de ese layer como los de trunk, vlan, etc en la física los serial bus, es decir los IEEE
Answer
  • NONE

Question 17

Question
CLAVE LA DIFERENCIA ENTRE AUTENTICACIÓN Y ACCESO cuando autenticamos (CREDENCIALES), queremos saber quien es quien para poder despues dar acceso (AUTORIZAR).
Answer
  • True
  • False

Question 18

Question
SEGURIDAD BASICA: Grant only privileges need to perform task, this limits the accidents Traffic analysis can help to know how is in the net End to end acces mininiza el riesgo in between
Answer
  • True
  • False

Question 19

Question
identifies sensitive data and plans measures to safeguard them - [blank_start]data policy[blank_end] enumerates technical requirements for security on systems and networks - [blank_start]sucurity policy[blank_end] internet usage must be define only for official purppose and nos personal use - [blank_start]internet usage policy[blank_end] shows by whom and how the systems are used - [blank_start]computer usage policy[blank_end]
Answer
  • sucurity policy
  • computer usage policy
  • data policy
  • data policy
  • sucurity policy
  • computer usage policy
  • internet usage policy
  • data policy
  • data policy
  • computer usage policy
  • sucurity policy

Question 20

Question
enumerates the actions to be taken when a computer security incident occurs - [blank_start]incident response policy[blank_end]
Answer
  • incident response policy

Question 21

Question
Las capas que ENVIAN cosas son: en TCP/IP - [blank_start]transporte[blank_end] en OSI hay dos: [blank_start]Data Link[blank_end] para LAN, [blank_start]NETWORK[blank_end](Red en español) para routear a otras redes
Answer
  • transporte
  • transport
  • Data Link
  • data link
  • NETWORK(red)
  • network(red)
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

Yr 12 Biology Mid-Year Exam Notes Part 1
gbridgland
Psychology Exam review
emaw757
OCR Gateway GCSE P3 Revision Quiz
xhallyx
GCSE AQA Chemistry Atomic Structure and Bonding
mustafizk
Forensic Science
joannaherbert
Chemistry unit 2
36jessieh
Stave One - A Christmas Carol
hannahshields58
“The knower’s perspective is essential in the pursuit of knowledge.” To what extent do you agree with this statement?
Lucia Rocha Mejia
Pscod new model test#1
Sukesh Angla