Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

F7 F8 Networking 1

Formative Assessments

QuestionAnswer
What happens if part of an FTP message is not delivered to the destination? The part of the FTP message that was lost is re-sent.
Which two operations are provided by TCP but not by UDP? Acknowledging received data and retransmitting any unacknowledged data
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? VoIP and DNS
What is a responsibility of transport layer protocols? Tracking individual conversations
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? SYN and ACK
Which number or set of numbers represents a socket? 192.168.1.1:80
What is the purpose of using a source port number in a TCP communication? To keep track of multiple conversations between devices
How does a networked server manage requests from multiple clients for different services? Each request is assigned source and destination port numbers
What is a socket? The combination of a source IP address and port number or a destination IP address and port number
What is the complete range of TCP and UDP well-known ports? 0 to 1023
What is a well-known graphic-image format? JPG
What is a well-known format for videos? MOV
Which of the following is a feature of the Gnutella protocol? Users can share whole files with other users.
This is a function of the OSI session layer. Exchange of information to initiate dialog between peers
Formatting, or presenting, data at the source device into a compatible format for receipt by the destination device, is a function of which layer? Presentation Layer
This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts. Application
True or false? In a peer-to-peer network environment every peer can function as both a client and a server. True
Which protocol can be used to transfer messages from an email server to an email client? POP3
Which two tasks can be performed by a local DNS server? Providing IP addresses to local hosts and mapping name-to-IP addresses for internal hosts
Which three protocols or standards are used at the application layer of the TCP/IP model? HTTP, GIF, MPEG
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business? IMAP
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model? Client
What part of the URL, represents the top-level DNS domain? .com
Which TCP/IP model layer is closest to the end user? Application
What message type is used by an HTTP client to request data from a web server? GET
What are two characteristics of the application layer of the TCP/IP model? Closest to the end user and the creation and maintenance of dialogue between source and destination applications
Why is DHCP preferred for use on large networks? It is a more efficient way to manage IP addresses than static address assignment
Which protocol can be used to send email from a client to a mail server? SMTP
Which three services are provided by the AAA framework? authentication, authorization, accounting
One of the most effective security tools available for protecting users from external threats? firewalls
For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task? firewall settings
Which component is designed to protect against unauthorized communications to and from a computer? firewall
Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked? worm
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds? RouterA(config)# login block-for 30 attempts 2 within 10
What is the purpose of the network security accounting function? to keep track of the actions of a user
Which benefit does SSH offer over Telnet for remotely managing a router? encryption
A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection? remote access to a switch where data is encrypted during the session
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? environmental
What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications? QoS
Where are Cisco IOS debug output messages sent by default? console line
A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices? devices with support for modularity
What type of traffic would most likely have the highest priority through the network? voice
What factor should be considered in the design of a small network when devices are being chosen? cost of devices
Which two traffic types require delay sensitive delivery? video, voice
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails? Have a second router that is connected to another ISP
A user is unable to reach the website when typing in a web browser, but can reach the same site by typing What is the issue? DNS
Which network design consideration would be more important to a large corporation than to small business? redundancy
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host? tracert 10.1.1.5
Created by: saiii
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards