Which OSI layer is related to the function of the IP protocol suite?
Network
Which OSI layer is responsible for organizing how bits are passed
... [Show More] over the physical layer between devices within the same collision domain?
Data link
Which OSI layer would define the scope of a protocol that makes sure packets of data are received correctly and resends them if they are not?
Transport
Which protocol suite performs functions of OSI layer 4?
TCP
Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length?
CAT 6a
Which device is used to organize network cables as they run between switches and other network devices?
Patch panel
Which networking standard uses UTP cable and CSMA/CD to manage connected devices' access to the wire?
Ethernet
What facilitates network functions at the data link and physical layers by use of a unique MAC address?
NIC
Which network device is used to connect two or more network segments by performing OSI layer 3 functions like packet-forwarding?
Router
Which network device can be used as shared storage for all member nodes of a LAN?
File server
Which device is responsible for implementing network address translation (NAT)?
Router
Which command produces the following output?
Non-authoritative answer:
Name: www.google.com
Address: 172.217.11.132
nslookup
Which network protocol allows a user to authenticate to a remote server, navigate the server's file structure, and upload and download files?
ftp
Which network diagnostic tool displays the path packets take between two endpoints?
traceroute
Which network type is used to wire multiple PCs to a home router?
LAN
An office's infrastructure connects network devices and printers through a central access point without the use of cabling.
Which network type does this office use?
WLAN
What type of medium is commonly used within a 1000 Mbps Ethernet network?
CAT5e
Which network topology is shown in the following diagram?
Full mesh
Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node?
Ring
In which physical LAN topology are nodes connected to each other with a backbone cable that loops around and ends at the same point it started?
Ring
Which OSI layer ensures error-free packets?
Transport
Which topology uses a switch or hub to connect to all devices in the same network?
Star
Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations?
Community
Which service offering provides the tools and environment for application development and testing?
PaaS
Which type of software is used to provide virtualization?
Hypervisor
A user that does not want to be identified while communicating on a network uses an application to alter the computer's identity.
Which type of exploit is being perpetrated?
Spoofing
An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the network computer's cache of IP address to MAC address mappings that are cached.
Which exploit is the attacker perpetrating?
ARP poisoning
Which exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself?
Wiretapping
Which type of attack can overwhelm a web server by inserting more data into a web form than the system was configured to hold?
Buffer overflow
Which type of attack sends an email claiming to be from a reputable business in order to entice the recipient to provide sensitive information?
Phishing [Show Less]