is451e1reviewqye

  1. HTTP maintains no information about the clients, so it's called a _ protocol.
    A. stateful
    B. stateless
    C. In-band
    D. Out-of-band
    B. stateless
  2. If you have 10 nodes connected through an Ethernet hub, what is the logical topology of your segment?
    a. Ring
    b. Star
    c. Mesh
    d. Bus
    d. Bus
  3. If you have 10 nodes connected through an Ethernet hub, what is the physical topology of your segment?
    a. Ring
    b. Star
    c. Mesh
    d. Bus
    b. Star
  4. During a communication session between 2 processes, one is known as a client and the other is known as a serve. This is true of …
    a. Client-server architecture
    b. Peer-to-peer architecture
    c. Hybrid architecture
    d. All of the above
    d. All of the above
  5. Elastic applications …
    a. Require a certain amount of bandwidth
    b. Can use any amount of bandwidth available
    c. Don't use any bandwidth
    d. Don't exist
    b. Can use any amount of bandwidth available
  6. A persistent connection where a client doesn't wait for a response from an HTTP server before issuing a new request is …
    a. Pipelined
    b. Non-pipelined
    c. In-band
    d. Out-of-band
    a. Pipelined
  7. What is a function of DHCP?
    a. To dynamically resolve host names to IP addresses
    b. To dynamically configure IP protocol on hosts
    c. To dynamically translate IP addresses to host names
    d. All of the above
    b. To dynamically configure IP protocol on hosts
  8. Transport layer port number identifies …
    a. A specific host on the network where sending process resides
    b. A specific host on the network where receiving process resides
    c. A specific process running on a network host
    d. A specific host running on a network process
    c. A specific process running on a network host
  9. Alice emails Bob. What mail protocol is used to transmit a message from Alice's mail server to Bob's mail server?
    a. SMTP
    b. POP3
    c. IMAP
    d. HTTP
    a. SMTP
  10. An application process sends and receives messages to/from a network through a(n) …
    a. Socket
    b. IP address
    c. Port number
    d. Server
    a. Socket
  11. How many TCP connections does FTP use?
    a. 1
    b. 2
    c. 3
    d. 4
    b. 2
  12. Interactive real-time applications prefer to use …
    a. TCP because they can't afford data loss
    b. TCP because it provides faster timing/delivery
    c. UDP because they can't afford data loss
    d. UDP because it provides faster timing/delivery
    d. UDP because it provides faster timing/delivery
  13. SMTP server listens for client requests on port …
    a. 22
    b. 25
    c. 53
    d. 80
    b. 25
  14. Addressing at the _ layer is implemented using host addresses.
    a. Application
    b. Transport
    c. Network
    d. Data Link
    b. Transport
  15. SCTP can be described as …
    a. UDP + (plus) reliability
    b. UDP - (minus) reliability
    c. TCP + (plus) congestion control
    d. TCP - (minus) reliability
    a. UDP + (plus) reliability
  16. Alice emails Bob. What protocol is used by Bob to retrieve the message from his mail server?
    a. IMAP
    b. FTP
    c. SMTP
    d. MIME
    a. IMAP
  17. What is the difference between iterative and recursive DNS queries?
    a. Iterative queries place less burden on a queried DNS server
    b. Recursive queries place less burden on a queried DNS
    c. There is no difference between using a recursive and iterative queries
    d. Recursive query returns a referral to another DNS server
    a. Iterative queries place less burden on a queried DNS server
  18. What is the purpose of MIME?
    a. To push email from a sending mail server to a receiving mail server
    b. To retrieve email from a server
    c. To push email from a client to a server
    d. To encode non-ASCII email
    d. To encode non-ASCII email
  19. What is an advantage of DNS caching?
    a. It reduces average response delay to clients
    b. It increases accuracy in resolving client queries
    c. It increases average response delay to clients
    d. It reduces a number of queries to the caching name server
    a. It reduces average response delay to clients
  20. In a client-server application, a client process …
    a. Usually runs continuously
    b. Usually runs for a specific period of time when needed
    c. Listens for incoming requests
    d. Waits to be contacted by server
    b. Usually runs for a specific period of time when needed
  21. Which component of email application architecture is used to read, edit, and send messages?
    a. Mail access protocol
    b. User agent
    c. Mail server
    d. SMTP
    b. User agent
  22. The basic goal of hierarchical design is to …
    a. Use routers instead of switches
    b. Use switches instead of routers
    c. Separate different network functions
    d. Use less network devices
    c. Separate different network functions
  23. Which of the following is true of DHCP?
    a. Requests are routable across networks
    b. It cannot be used to configure servers that require a permanent address
    c. It can be used to always assign the same address to the same host
    d. It is used to resolve host names to IP addresses
    c. It can be used to always assign the same address to the same host
  24. Pipelining …
    a. Allows non-persistent HTTP connections to be used more efficiently
    b. Allows persistent HTTP connections to used more efficiently
    c. Wastes more server resources than non-pipelining
    d. Closes the connection after every object is transferred
    b. Allows persistent HTTP connections to used more efficiently
  25. Collapsed backbone redundancy can be achieved using:
    a. STP
    b. VRRP
    c. HSRP
    d. All of the above
    d. All of the above
  26. Address-based redundancy is achieved using:
    a. VRRP
    b. STP
    c. HSRP
    d. A and b
    e. A and c
    e. A and c
  27. What is an advantage of using persistent (as opposed to non-persistent) HTTP?
    a. There is no advantage of using one over the other
    b. It is more reliable
    c. It allows an HTTP server to "remember" a client
    d. Multiple objects can be transferred through the same connection
    d. Multiple objects can be transferred through the same connection
  28. In HSRP/VRRP a virtual router is used to represent a physical router and its backup. The virtual router is configured …
    a. To have the MAC and IP addresses of both physical routers
    b. To have a different MAC and IP addresses than 2 physical routers
    c. Not to have a MAC and IP address
    d. To have the MAC and IP address of the backup router
    b. To have a different MAC and IP addresses than 2 physical routers
  29. What can be used to break your network into separate broadcast domains?
    a. Bridges
    b. Routers
    c. VLANs
    d. Both routers and bridges
    e. Both routers and VLANs
    e. Both routers and VLANs
  30. How does replacing a hub with a switch on a network segment that connects your end devices affect the segment topology?
    a. Both physical and logical topology will change
    b. Neither physical nor logical topology will change
    c. Only physical, but not logical topology will change
    d. Only logical, but not physical topology will change
    d. Only logical, but not physical topology will change
  31. Which of the following devices has functionality similar to router?
    a. Hub
    b. Switch
    c. Bridge
    d. Layer 3 switch
    d. Layer 3 switch
  32. A trunk is a(n):
    a. End device
    b. Internetworking device
    c. High-speed link between individual end devices
    d. High-speed link between internetworking devices
    d. High-speed link between internetworking devices
  33. The network design layer closest to the user is …
    a. End device
    b. access
    c. Distribution
    d. core
    b. access
  34. In HSRP/VRRP a virtual router is used to …
    A. To avoid loops when multiple routing paths exist
    B. To provide a 3rd backup router to the pair of existing routers
    C. To provide fault-tolerance for the default gateway address for end stations
    D. To provide fault-tolerance for the routing table of existing routers
    c. To provide fault-tolerance for the default gateway address for end stations
  35. Modern large network design requires use of routing in addition to switching because:
    a. It's cheaper
    b. Routers are faster than switches
    c. More end devices per segment are connected at faster speeds
    d. All of the above
    c. More end devices per segment are connected at faster speeds
  36. The most popular way to assign members to a VLAN is by _.
    Port
  37. _ application protocol uses out-of-band control connection.
    FTP
  38. Redundancy at layer 3 can be implemented using _ protocol.
    VRRP/HSRP
  39. Switches can use _ to detect a bad link and find a backup link.
    STP
  40. For email users who access their email from multiple locations, it is preferable to use _ mail access protocol.
    IMAP
  41. You (an application process) are sending a letter to your friend (another application process). Your address the letter to 29 Elm Street. Which part of the address is equivalent to the host address and which to the port number?
    • 29 is equivalent to the port number
    • Elm Street is equivalent to host number
  42. List and define 3 layers of hierarchical design
    • Core - in the middle
    • Distribution
    • Access -closer to the user
  43. Contrast and compare collision domains and broadcast domains
    • Collision domain is on each switch port to prevent packets sent at the same time to collide with one another.
    • Broadcast domain on a router to broadcast or send signal to hosts
  44. Describe the purpose of using a trunking/tagging protocol (such as IEEE 802.1Q) between switches.
    • To exchange information about VLAN configuration
    • VLAN info for VLANs spanning switches
Author
tttran1
ID
264054
Card Set
is451e1reviewqye
Description
is451e1rqe
Updated