Network+ 8th edition, Chapter 1 review questions

c. HTTP

1. In the client-server model, what is the primary protocol used for communication between a browser and web server?
a. FTP
b. TCP
c. HTTP
d. SSL

b. SSL and TLS

2. Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
a. HTTP and HTTPS
b. SSL and TLS
c. SSL and HTTP
d. TCP and UDP

d. POP3

3. Which email protocol allows an email client to download email messages to the local computer?
a. IMAP4
b. SMTP
c. TCP
d. POP3

a. IMAP4

4. Which email protocol allows an email client to read mail stored on the mail server?
a. IMAP4
b. SMTP
c. TCP
d. POP3

b. Remote Desktop

5. Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
a. Telnet
b. Remote Desktop
c. SFTP
d. SSH

D. Peer-to-peer

6. A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
a. Star-bus
b. Ring

b. client-server

7. In question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support without the upgrade?
a. Hybrid
b. Client-server
c. Star-bus
d. Ring

d. star

8. A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
a. Hybrid
b. Mesh
c. Star-bus
d. Star

c. star-bus

9. In question 8, suppose a new switch is connected to the first switch by way of a network cable, and three computers are connected to the new switch. Which network topology is used?
a. Hybrid
b. Mesh
c. Star-bus
d. Star

b. port

10. Which type of address is used at the Transport layer to identify the receiving application?
a. IP address
b. Port
c. MAC address
d. Protocol

AD (Active Directory)

11. What is the name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?

switch belongs only to one network
router belongs to more than one network

12. What is the fundamental distinction between a Layer 2 switch and router?

host is a computer that hosts a resource on the network
node is any computer that can be addressed on the network

13. What is the fundamental distinction between a node and a host?

WANs expand over a larger geographical area than MANs
MANs cover a small geographical area. WANs cover a large geographical area

14. What is the fundamental distinction between a MAN and a WAN?

segment; datagram; Layer 4: Transport Layer

15. What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work?

IP address

16. At the Network layer, what type of address is used to identify the receiving host?

MAC address

17. At the Data Link layer, which type of network address is used to identify the receiving node?

Layer 1: Physical Layer, Layer 2: Data Link Layer

18. A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the netw

Layer 7: Application Layer

19. A user complains that he cannot access a particular website, although he is able to access other websites. At which layer of the OSI model should you begin troubleshooting this problem?

Layer 5: Session Layer, Layer 7: Application Layer

20. A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you begin troubleshooting? Which OSI layer is responsible for not dropping the Skype connection?