1.
- A user starts their computer at the beginning of the day. After logging on to the network, the user immediately opens their web browser and accesses the company’s website at http://www.myco.com. Which two types of servers were contacted by the user’s computer after the browser was started if the user successfully connects to the web site? (Choose two answers.)
Correct Answer(s)
A. Web server
D. DNS Server
Explanation
After the user starts their computer and opens their web browser, the first server contacted would be the DNS (Domain Name System) server. This server is responsible for translating the human-readable URL (http://www.myco.com) into an IP address that the computer can understand. Once the IP address is obtained, the user's computer then contacts the web server. The web server stores and delivers the company's website content to the user's browser, allowing them to successfully connect to the website. Therefore, the two types of servers contacted by the user's computer in this scenario are the DNS server and the web server.
2.
The configuration settings a computer will use when it boots up are usually stored where?
Correct Answer
A. On disk
Explanation
The configuration settings a computer will use when it boots up are usually stored on disk. This is because the disk, typically a hard disk drive (HDD) or solid-state drive (SSD), is a non-volatile storage device that retains data even when the computer is powered off. The settings are saved on the disk in a specific file or files, such as the BIOS or UEFI settings, which are accessed during the boot process to initialize the computer's hardware and software components. Storing the settings on disk ensures that they are persistently available for future boot-ups.
3.
Once a computer has completed its boot sequence, the active/run-time configuration settings are where?
Correct Answer
B. In RAM
Explanation
After a computer completes its boot sequence, the active/run-time configuration settings are stored in RAM (Random Access Memory). RAM is a type of computer memory that allows data to be read from and written to quickly. It is volatile memory, meaning that its contents are lost when the computer is powered off. Storing the configuration settings in RAM allows for quick access and modification of these settings during the computer's operation.
4.
If you go to an https:// web site, what does the web server send your computer to validate its identity?
Correct Answer
C. A digital certificate
Explanation
When you go to an https:// website, the web server sends your computer a digital certificate to validate its identity. A digital certificate is a file that contains information about the website and its owner, including a public key. This certificate is issued by a trusted third-party organization called a Certificate Authority (CA), which verifies the authenticity of the website. Your computer uses this digital certificate to establish a secure connection with the website and ensure that your data is encrypted and transmitted securely.
5.
The TCP/IP stack is installed on computers as part of the _____________.
Correct Answer
B. Operating System
Explanation
The TCP/IP stack is installed on computers as part of the operating system. The operating system provides the necessary software infrastructure for networking protocols and services, including TCP/IP, to function properly. It handles the communication between different network layers and manages the transmission and reception of data packets. Without the operating system, the TCP/IP stack would not be able to operate and facilitate network communication.
6.
In a small branch-office LAN, there is a switch, a router, and four host computers. Which devices will connect directly to the router? (Choose all that apply.)
Correct Answer
D. The switch
Explanation
The switch will connect directly to the router. The switch is responsible for connecting all the devices within the LAN, including the host computers and the router. The host computers will then connect to the switch, which will in turn connect to the router. This allows the host computers to access the Internet through the router.
7.
Which command is used for actively testing a network connection between two hosts?
Correct Answer
D. Ping
Explanation
The correct answer is "ping". Ping is a command used to test the connectivity between two hosts on a network. It sends a small packet of data to the destination host and waits for a response. If a response is received, it indicates that the network connection is active and functioning properly. Ping is commonly used to troubleshoot network issues and determine the latency or response time between hosts.
8.
Which of these services will still work even if a packet is “dropped” during network communications? (Choose all that apply.)
Correct Answer(s)
A. Streaming Video
C. Streaming Audio
Explanation
Streaming video and streaming audio services will still work even if a packet is "dropped" during network communications because these services use real-time protocols that can tolerate some packet loss without affecting the overall quality of the stream. In contrast, file transfers and sending email rely on reliable transmission protocols that require all packets to be successfully delivered for the transfer to be completed successfully. Therefore, if a packet is dropped during network communications for file transfers or sending email, the transfer may fail or be corrupted.