Question 1
Question
What does OSI stand for?
Answer
-
Open System Interconnection
-
Overlay standard industry
-
Open standard industry
-
Overlay system interconnection
Question 2
Question
What layer is not part of the OSI model upper layers?
Answer
-
The Application Layer
-
The Network Layer
-
The Presentation Layer
-
The Session Layer
Question 3
Question
What are the OSI model lower layers?
Answer
-
Transport Layer, Network Layer, Data-Link Layer, and Physical Layer
-
Application Layer, Presentation Layer, and Physical Layer
-
Data-Link Layer, Network Layer, Session Layer, Application Layer
Question 4
Question
What are the roles of the application layer?
Answer
-
Provides the framework that the actual applications run on top of (Human-Machine readable interface).
-
Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand
-
Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts
-
Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).
Question 5
Question
What are the roles of the presentation layer?
Answer
-
Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts
-
Provides the framework that the actual applications run on top of (Human-Machine readable interface).
-
Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand
-
Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).
Question 6
Question
What are the roles of the Transport Layer?
Answer
-
Takes the data from each application, and integrates it all into a single stream maintaining flow control
-
Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer
-
Establish a session with the receiving host;sessions are established between applications
-
Provides the framework that the actual applications run on top of (Human-Machine readable interface).
Question 7
Question
What are the roles of the session Layer?
Answer
-
Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand
-
Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer
-
Establish a session with the receiving host; sessions are established between applications
-
Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).
Question 8
Question
What are the roles of the Network Layer?
Answer
-
Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts
-
Provides the framework that the actual applications run on top of (Human-Machine readable interface).
-
Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).
-
Establish a session with the receiving host;sessions are established between applications
Question 9
Question
What are the roles of the Data Link Layer?
Answer
-
Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand
-
Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer
-
Takes the data from each application, and integrates it all into a single stream maintaining flow control
-
Provides the framework that the actual applications run on top of (Human-Machine readable interface).
Question 10
Question
What are the roles of the Physical Layer?
Answer
-
Provides the framework that the actual applications run on top of (Human-Machine readable interface).
-
Establish a session with the receiving host; sessions are established between applications
-
Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).
-
Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer
Question 11
Question
Provides application services for file transfers, e-mail, and other network software services.
Answer
-
Application Layer
-
Presentation Layer
-
Network Layer
-
Physical Layer
Question 12
Question
This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Answer
-
Presentation Layer
-
Application Layer
-
Network Layer
-
Physical Layer
Question 13
Question
Responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Answer
-
Session Layer
-
Application Layer
-
Transport Layer
-
Physical Layer
Question 14
Question
Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Answer
-
Physical Layer
-
Network Layer
-
Presentation Layer
-
Transport Layer
Question 15
Question
Provides error-free transfer of data frames from one node to another over the physical layer.
Answer
-
Transport Layer
-
Application Layer
-
Session Layer
-
Data-Link Layer
Question 16
Question
What are the address types at Layer 1
Question 17
Question
What are the two sublayers of Layer2
Answer
-
Media Access Control (MAC) layer
-
Open System Interconnection (OSI)
-
802.3u
-
Logical Link Control (LLC) layer
Question 18
Question
What are the address types at Layer 2
Answer
-
802.11 (WLAN), Wi-Fi, WiMAX
-
TCP, SPX and UDP
-
SSL, WEP, WPA
-
SONET/SDN,Coaxial Cable, Twisted Pair Cable
Question 19
Question
What are the address types at Layer 3
Answer
-
TCP, SPX and UDP
-
OSPF, ICMP, IGMP and ARP
-
SNMP, SSH, TELNET and NTP
-
Logical Ports 21, 22, 23, 80 etc
Question 20
Question
What are the address types at Layer 4
Question 21
Question
What are the address types at Layer 5
Answer
-
Ethernet, Token Ring, Frame Relay, PPTP, L2TP and ISDN
-
Logical Ports 21, 22, 23, 80 etc.
-
SSL, WEP, WPA, Kerberos,
-
ICMP, IGMP and ARP
Question 22
Question
What are the address types at Layer 6
Question 23
Question
What are the address types at Layer 7
Answer
-
Hubs, Repeaters, Cables, Optical Fiber,
-
IPv4, IPV6, IPX, OSPF, ICMP, IGMP and ARP
-
Twisted Pair Cable and Connectors
-
DHCP, DNS, FTP, HTTP
Question 24
Question
What is the purpose of address resolution protocol (ARP)
Answer
-
used to locate the Ethernet address associated with a desired IP address
-
the area of the computer network that consists of every single computer
-
special broadcast address consisting of all used to send frames to all devices on the network
-
virtual broadcast domain created inside a switch
Question 25
Question
How many bytes are comprised in an hardware address (MAC address)?
Answer
-
6 Bytes
-
4 Bytes
-
48 Bits
-
128 Bytes
Question 26
Question
LACP is a protocol that detects error conditions on member links and redistributes traffic to other member links, thus preventing any loss of traffic on the failed link.
Question 27
Question
How many bits are dedicated to organization unique identifier (OUI)?
Answer
-
24 bits
-
24 Bytes
-
3 octets
Question 28
Question
What is the "I/G" bit in the hardware address?
Answer
-
signifies whether the hardware address represents an individual device or a group of devices
-
resolves MAC addresses into IP addresses.
-
signifies support for half duplex Ethernet adds frame bursting and carrier extension
Question 29
Question
BIG-IP system uses a what technology to distribute traffic across multiple links. What is the process?
Answer
-
Multi-Port
-
Trunk
-
logical link
-
BIG Links
Question 30
Question
BIG IP assigns MAC address from the lowest-numbered interface of the trunk.
Question 31
Question
BIG-IP uses what trunk protocol?
Question 32
Question
Indicates the cost of using a route, which is typically the number of hops to the IP destination.
Answer
-
Metric
-
Gateway
-
Interface
-
VLAN
Question 33
Question
The IP address that the local host uses to forward IP datagrams to other IP networks.
Question 34
Question
Routing protocols perform several activities, including:
Question 35
Question
Remote networks are added to the routing table in two ways:
Answer
-
By the network administrator manually configuring static routes.
-
By implementing a dynamic routing protocol.
-
By waiting for application to tell the network about IP address
-
By email from host to host
Question 36
Question
Select dynamic routing protocols:
Answer
-
OSPF
-
IS-IS
-
Static routing
-
IGP
-
BGP
Question 37
Question
Fragmentation happens when a large IP datagram has to travel through a network with a maximum transmission unit (MTU) that is smaller than the size of the IP datagram.
Question 38
Question
How are the packets reassembled?
Answer
-
TCP performs reassembly
-
On the receiving end host using fragment ID
-
packets stay connected during transmission
-
application layer assembles the packets for viewing
Question 39
Question
The maximum TTL value is _________.
Answer
-
255
-
64
-
1
-
no TTL exist in packets
Question 40
Question
What transmission technology is used for fragmentation of datagrams?
Question 41
Question
Which of the types is not a unicast IPv6 unicast addresses?
Answer
-
Global-Unicast
-
Multicast
-
Link-Local Address
-
Unique Local Address
-
Loopback Address
Question 42
Question
IPv6 multicast is routable, and routers will not forward multicast packets unless there are members of the multicast groups to forward the packets to.
Question 43
Question
An anycast address is a single address assigned to a single nodes.
Question 44
Question
IPv6 address is comprised of ________ blocks of ______ bits?
Answer
-
8 Blocks
-
16 Blocks
-
128 Bits
-
64 Bits
Question 45
Question
What are the terms commonly referred in a "Three-way handshake"
Question 46
Question
What is common maximum TCP "MTU" packet size for TCP packet?
Question 47
Question
During session connection establishment, two peers, or hosts, engage in negotiations to determine the IP segment size of packets that they will exchange during their communication.
Question 48
Question
What is an endpoint to a logical connection and the way a client program specifies a specific server program on a computer in a network?
Answer
-
Protocol Ports
-
logical Address
-
Ethernet addresses
-
VLAN
Question 49
Question
What are TCP RST Packets?
Question 50
Question
What are the three TCP Options?
Answer
-
Option-Kind
-
Option-SYN count
-
Option-Length
-
Option-Data
Question 51
Question
A web browser is an example of a ________.
Answer
-
user agent (UA)
-
server
-
host
-
user server (US)
Question 52
Question
HTTP is an application layer protocol designed within the framework of the Internet Protocol Suite.
Question 53
Question
HTTP request and response messages share similar message attributes, which are:
Answer
-
label maker request
-
an initial line
-
an optional message body
-
SMTP header
Question 54
Question
Define the initial line: GET /path/to/file/index.html HTTP/1.0
Answer
-
Initial Request Line
-
Initial Response Line
-
HTTP retrieval syntax
-
C+ Code
Question 55
Question
Define initial response line: HTTP/1.0 200 OK or HTTP/1.0 404 Not Found
Question 56
Question
A message asks the server to return the response headers only, and not the actual resource (i.e. no message body).
Answer
-
POST Method
-
HEAD Method
-
Initial Response Line
-
Initial Request Line
Question 57
Question
A request is used to send data to the server to be processed in some way, like by a CGI script.; , block of data sent with the request, request URI is not a resource to retrieve, and HTTP response is normally program output, not a static file.
Answer
-
HTTP Keep-alives
-
HEAD Method
-
Initial Response Line
-
POST Method
Question 58
Question
Also called HTTP persistent connection, or HTTP connection reuse, is the idea of using a single TCP connection to send and receive multiple HTTP requests/responses, as opposed to opening a new connection for every single request/response pair.
Answer
-
HTTP Keep-alives
-
HTTP GET
-
SIP
-
DNS
Question 59
Question
Session Initiation Protocol (SIP) is a communications protocol used for communicating between different devices on a company network, whether on the LAN, the WAN, or across the Internet.
Question 60
Question
In FTP mode, the client connects from a random unprivileged port (N > 1023) to the FTP server’s command port, port 21.
Answer
-
Active
-
Passive
-
Random
-
RCP
Question 61
Question
client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an the connection, the client opens two random unprivileged ports locally (N > 1023 and N+1).
Answer
-
SMTP
-
Telnet
-
Passive FTP
-
RDP
Question 62
Question
Outlook Express connects to the SMTP server at mail.howstuffworks.com using port 53 ?
Question 63
Question
The SMTP server takes the address of the sender and the address of the recipient, as well as the body of the message. and breaks it into two parts:
Answer
-
recipient name
-
HTTP GET message
-
domain name
-
HTML code
Question 64
Question
SMTP Command:
introduce yourself and request extended mode
Question 65
Question
List the common
• [blank_start]HELO[blank_end] - introduce yourself
• [blank_start]EHLO[blank_end] - introduce yourself and request extended mode
• [blank_start]MAIL FROM:[blank_end] - specify the sender
• [blank_start]RCPT TO:[blank_end] - specify the recipient
Answer
-
HELO
-
EHLO
-
MAIL FROM
-
RCPT TO
Question 66
Question
• [blank_start]DATA[blank_end] - specify the body of the message (To, From and Subject should be the first three lines.)
• [blank_start]RSET[blank_end] - reset
• [blank_start]QUIT[blank_end] - quit the session
• [blank_start]HELP[blank_end] - get help on commands
• [blank_start]VRFY[blank_end] - verify an address
Question 67
Question
allows a site to store state information on your machine
Answer
-
name-value pairs
-
cookie
-
message
-
EHOL
Question 68
Question
In HTTP version, what response status code gives NXX redirects the client to another URL ?
Question 69
Question
In HTTP version, what response status code gives NXX indicates an error on the client’s part ?
Question 70
Question
In HTTP version, what response status code gives NXX indicates an error on the server’s part ?
Question 71
Question 72
Question
For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with
Question 73
Question
a reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it.
Answer
-
URL
-
SIP
-
Logical Port
-
directory
Question 74
Question
a standard plain text data interchange format for representing LDAP (Lightweight Directory Access Protocol) directory content and update requests.