Ch.1 IT280

Last update by Sheila on 07/12/2013
55362 People have viewed this Quiz
  • Share

1.2 What device is used to create a physical star topology?
Bridge
Firewall
Switch
Router

Answer:
switch

View Ch.1 IT280 as Flashcard Deck

Related Quiz Content
  • michaelisgila
    Answered in Ch.1 IT280
    1.3 Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server?
    SMTP
    POP3
    SPC
    SNMP
    FTP
  • michaelisgila
    Answered in Ch.1 IT280

    1.3 Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?


    TCP  
    ARP  

    IGMP

     
    ICMP  
    DHCP  
    IP  
  • michaelisgila
    Answered in Ch.1 IT280

    1.3 You have a large TCP/IP network and want to keep hosts' real time clock synchronized. What protocol should you use?
    SNMP
    NTP
    SMTP
    NNTP
    SAP
  • michaelisgila
    Answered in Ch.1 IT280

    1.5 Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received with out mistakes?
    UCP
    UDP
    TCP
    UDB
  • michaelisgila
    Answered in Ch.1 IT280

    1.5 Which OSI model layer is responsible for guaranteeing reliable message delivery?


    Data Link
    Transport
     Application

    Session

  • michaelisgila
    Answered in Ch.1 IT280

    1.2 You have a network that uses a logical bus topology.  How do messages travel through the network?
    Messages are sent to a central device which then forwards the message to the destination device.
    Messages are sent directly to the correct destination device.
    Messages are broadcast to all devices connecgted to the network.
    Messages travel from one device to the next until they reached the destination device.
  • michaelisgila
    Answered in Ch.1 IT280

    1.5 Which of the following is a file transfer protocol that uses UDP?
    SMTP
    FTP
    TFTP
    NTP
    HTTP
    POP3
  • michaelisgila
    Answered in Ch.1 IT280

    1.2 Which of the following topologies connects each network device to a central hub?


    Ring
    Bus
    Mesh
    Star
  • michaelisgila
    Answered in Ch.1 IT280

    1.5 Which two of the following are included as part of the Data Link layer specifications?
    Controlling how messages are propagated through the network.
    Identifying physical network devices.

    Composition of electrical signals as they pass through the transmission medium.


    Synchronizing individual bits as they are transmitted through the network.
  • michaelisgila
    Answered in Ch.1 IT280

    1.5 In the OSI model, which of the following functions are performed at the Application layer?

    Select all that apply.


    Data translation
    Enabling communication between network clients and services
    Conversation identification
    Integration of network functionality into the host operating system
  • michaelisgila
    Answered in Ch.1 IT280

    1.3 You want to allow your users to download files from a server running the TCP/IP protocol.  You want to require user authentication to gain access to specific directories on the server.  Which TCP/IP protocol should you implement to provide this capability?
    TCP

    HTTP


    HTML


    FTP
    IP
    TFTP