Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive exam guide for the cts 1134 course, covering a wide range of networking and it-related topics. The exam questions and precise answers provided suggest this document could be a valuable resource for students preparing for this exam. Fundamental networking concepts, protocols, hardware, and software, as well as workplace safety, cabling standards, and network management tools. The level of detail and the focus on providing precise, verified answers indicate this document could be useful as study notes, lecture notes, or a summary for students enrolled in a networking or it-related university course. The document seems to be targeted towards university students, but could also be beneficial for high school students or lifelong learners interested in networking and it topics.
Typology: Exams
1 / 11
What statement accurately reflects what occurs when a message is too large to transport on a network? - Precise Answer ✔✔The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). In the United States, who is able to activate the Emergency Alert System at the national level? - Precise Answer ✔✔The president What is the most popular web server application? - Precise Answer ✔✔Apache What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? - Precise Answer ✔✔The packet will be divided into smaller packets using fragmentation. After a problem and its symptoms have been identified, a theory regarding a probable cause should be established. - Precise Answer ✔✔true The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. - Precise Answer ✔✔true
What federal agency is charged with safety and health in the workplace?
What statement accurately describes what a cable bend radius determines? - Precise Answer ✔✔A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data. When creating network diagrams, what icon description typically represents a network firewall? - Precise Answer ✔✔a brick wall What statement regarding main distribution frame (MDF) or main distribution facilities is accurate? - Precise Answer ✔✔The MDF is the centralized point of interconnection for an organization's LAN or WAN. What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system? - Precise Answer ✔✔TIA/EIA-568 and IEEE Commercial Building Wiring Standard When creating network diagrams, what icon description typically represents a network switch? - Precise Answer ✔✔An icon that is rectangular, which contains four arrows pointing in opposite directions. Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase? - Precise Answer ✔✔request for proposal
A master service agreement (MSA) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements. - Precise Answer ✔✔true Which of the following is NOT a range of IP addresses recommended for use in private networks? - Precise Answer ✔✔127.0.0.0 through 127.255.255. The addresses in RFC 1918 are 10.0.0.0-10.255.255.255, 172.16.0.0- 172.31.255.255, and 192.168.0.0-192.168.255.255. What text editor can be used on Linux to view and edit the contents of a configuration file? - Precise Answer ✔✔vim What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? - Precise Answer ✔✔ping A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? - Precise Answer ✔✔ipconfig /flushdns What command can be used to check a domain computer's time source from a Command Prompt window? - Precise Answer ✔✔w32tm /query /source
DNS follows a centralized database model, allowing for easier management of DNS records. - Precise Answer ✔✔false At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. - Precise Answer ✔✔true How do routers create a broadcast domain boundary? - Precise Answer ✔✔They do not forward broadcast traffic. With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? - Precise Answer ✔✔mycompany.com Which of the following IPv6 addresses represents a global unicast address? - Precise Answer ✔✔2000::/ What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block? - Precise Answer ✔✔punchdown tool Which of the following is NOT a best practice when performing cable management? - Precise Answer ✔✔Cable ties should be pulled tightly to keep cables from moving around in a bundle. What is the name of the GUI front end that is available for the Nmap utility? - Precise Answer ✔✔zenmap
F5 Networks set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices. - Precise Answer ✔✔false What does a statement of work document do? - Precise Answer ✔✔It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline. What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs? - Precise Answer ✔✔vertical cross connect Which of the following is not one of the disadvantages of peer-to-peer networks? - Precise Answer ✔✔They centralize user account logins At what layer of the OSI model does a network switch normally operate? - Precise Answer ✔✔Layer 2 The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. - Precise Answer ✔✔false In the TCP/IP model, what layer is considered so simple that it is ignored entirely? - Precise Answer ✔✔physical
What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? - Precise Answer ✔✔SNMP (Simple Network Management Protocol) When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? - Precise Answer ✔✔upset failure What is a defining characteristic of a bus topology based network? - Precise Answer ✔✔Devices are daisy-chained together in a single line. Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? - Precise Answer ✔✔SIP (Session Initiation Protocol) What statement regarding the Server Message Block protocol is accurate? - Precise Answer ✔✔It is used by Windows and UNIX-based operating systems to share files. In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? - Precise Answer ✔✔AAAA record
If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? - Precise Answer ✔✔EUI- The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. - Precise Answer ✔✔false You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? - Precise Answer ✔✔The computer is configured to use DHCP, but was unable to lease an address. You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? - Precise Answer ✔✔dig @8.8.8. mycompany.com MX A hexadecimal number is a number written in the base 16 number system. - Precise Answer ✔✔true When creating network diagrams, what icon description typically represents a network router? - Precise Answer ✔✔An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.
What is the minimal amount of voltage required to damage an electrical component? - Precise Answer ✔✔10 volts The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. - Precise Answer ✔✔true In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? - Precise Answer ✔✔Application An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? - Precise Answer ✔✔fail- close HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? - Precise Answer ✔✔layer 7 What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? - Precise Answer ✔✔session layer UDP port 123 is utilized by the Network Time Protocol service. - Precise Answer ✔✔true
DNS follows a centralized database model, allowing for easier management of DNS records. - Precise Answer ✔✔false Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? - Precise Answer ✔✔Both IPv4 and IPv6 protocols will be used on the network. ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. - Precise Answer ✔✔false Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. - Precise Answer ✔✔true In the DNS hierarchy, where is information about how to find the top- level domain servers held? - Precise Answer ✔✔On the DNS root servers. At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? - Precise Answer ✔✔port numbers When using IPv6, two or more nodes on the same link are said to be neighbors. - Precise Answer ✔✔true
The process of designing, implementing, and maintaining an entire network is called the system life cycle. - Precise Answer ✔✔true Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company? - Precise Answer ✔✔master license agreement During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? - Precise Answer ✔✔No more than 1 inch of the cable should be exposed. What mail protocol is used to send mail messages to a server? - Precise Answer ✔✔SMTP What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling? - Precise Answer ✔✔entrance facility