Network+ Chapter 4
Question 1 |
Which layer 4 protocol is connection-oriented?
A | TCP |
B | TFTP |
C | UDP |
D | IP |
Question 2 |
Which of the following protocols provides flow control, which controls the ability to reduce or increase the amount of data that is sent at a given time?
A | TCP |
B | UDP |
C | TFTP |
D | RTP |
Question 3 |
How is an "established connection" accomplished?
A | TCP three-way handshake |
B | Data duplication |
C | Trick question, there is no established connection |
D | Through UDP's fire and forget mechanisms |
Question 4 |
Which layer of the OSI model does UDP exist at?
A | Data Link |
B | Network |
C | Transport |
D | Application |
Question 5 |
Which of the following protocols is used for VoIP?
A | User Datagram Protocol |
B | Transmission Control Protocol |
C | Reliable Transport Protocol |
D | VLAN Trunking Protocol |
Question 6 |
What is the TTL field in the IP header used for?
A | Signify VoIP traffic is being transported |
B | Reduce the effects of routing loops |
C | Increase Spanning-Tree convergence times |
D | This field is no longer in use |
Question 7 |
Ping is one of the more popular trouble-shooting utilities. Which of the following protocols gives us this functionality?
A | ICMP |
B | IGMP |
C | SMTP |
D | POP3 |
Question 8 |
If you (network device) knew a layer 3 destination address, but needed to discover the accompanying layer 2 address, which protocol would you use?
A | ARP |
B | RARP |
C | FARP |
D | LARP |
Question 9 |
How many bits is an IPv4 address?
A | 32 |
B | 48 |
C | 128 |
D | 160 |
Question 10 |
Using classful addressing, what would the address 161.254.45.2 be classified as?
A | Class A |
B | Class B |
C | Class C |
D | Class D |
Question 11 |
What is the range for Class D addresses, and what are they used for?
A | 224-239, experimental |
B | 224-239, multicasting |
C | 240-255, experimental |
D | 240-255, multicasting |
Question 12 |
What is the 127.0.0.1 address used for, and if you ping'd it what does that tell you?
A | Loopback, TCP/IP stack properly installed |
B | Loopback, IP address properly configured |
C | Ringback, TCP/IP stack properly installed |
D | Ringback, IP address properly configured |
Question 13 |
What does a subnet mask describe?
A | Range of addresses for a given network ID |
B | Whether you are using a public or private address |
C | What the default-gateway address is |
D | VLAN identifier |
Question 14 |
What does DHCP do?
A | Assigns a network device a unique IP address |
B | Determines a layer 2 address when you only know a layer 3 address |
C | Enables multicasting on a network |
D | Enables broadcasting on a network |
Question 15 |
Is there anything significant about an address that starts with 169.254?
A | APIPA address |
B | No. |
C | DHCP address |
D | BOOTP address |
Question 16 |
How many bits are there in an IPv6 address?
A | 32 |
B | 48 |
C | 64 |
D | 128 |
Question 17 |
Which of the following is an example of a socket?
A | 215.14.36.12:23 |
B | 2001:AAEF::1 |
C | 80 |
D | 192.168.1.64 |
Question 18 |
What is the hosts file used for?
A | First stop for name resolution |
B | So your computer knows what its name is |
C | Needed to connect to another computer on your network |
D | Eliminates the need for DNS |
Question 19 |
Which layer of the OSI model is TELNET located within, and what is it used for?
A | Layer 3, remote administration |
B | Layer 7, remote administration |
C | Layer 3, most efficient path determination |
D | Layer 7, most efficient path determination |
Question 20 |
Which protocol is used on Routers and Switches for configuration and operating system backup?
A | TFTP |
B | SSH |
C | Telnet |
D | RDP |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| End |