1.
______is a protocol suite (which means there are many protocols in one) that was developed by Novell and was very popular on older NetWare networks. However, newer versions of NetWare (NetWare 5.x and above) have moved away from it and are using TCP/IP as the preferred protocol. Microsoft refers to this protocol as NWLink (NetWare Link).
Explanation
IPX/SPX is a protocol suite developed by Novell that was widely used on older NetWare networks. However, newer versions of NetWare have shifted to using TCP/IP as the preferred protocol. Microsoft refers to IPX/SPX as NWLink (NetWare Link).
2.
________ is a transport protocol developed by IBM but adopted by Microsoft for use in earlier versions of Windows and DOS. This protocol is commonly found in smaller networks due to the fact that it is a nonroutable protocol.
Explanation
NetBEUI is a transport protocol that was initially developed by IBM but later adopted by Microsoft for use in earlier versions of Windows and DOS. It is commonly found in smaller networks because it is a nonroutable protocol, meaning it cannot be used to communicate across different networks. NetBEUI is known for its simplicity and efficiency, making it suitable for smaller networks where routing capabilities are not required.
3.
NetBEUI has a close friend, _______, with which it works closely when communicating with systems on the network. It is an application programming interface (API) that is used to make network calls to remote systems. When you install NetBEUI, it includes this protocol, and it relies on it for session management functionality. Also, it is nonroutable but may be installed with other routable protocols such as IPX/SPX or TCP/IP to allow it's traffic to travel across networks.
Explanation
NetBEUI has a close friend, NetBIOS, with which it works closely when communicating with systems on the network. NetBIOS is an application programming interface (API) that is used to make network calls to remote systems. When NetBEUI is installed, it includes the NetBIOS protocol and relies on it for session management functionality. NetBIOS is nonroutable but may be installed with other routable protocols such as IPX/SPX or TCP/IP to allow its traffic to travel across networks.
4.
This protocol has two communication modes, Session mode and Datagram mode.
Explanation
NetBIOS is a protocol that provides services for communication between computers on a local area network. It supports two communication modes, Session mode and Datagram mode. In Session mode, a connection is established between the communicating devices, allowing for reliable and ordered data transmission. Datagram mode, on the other hand, does not require a connection and allows for faster but less reliable transmission of data. NetBIOS is commonly used for file sharing, printer sharing, and other network services.
5.
This communication mode is used for connection-oriented communication in which NetBIOS would be responsible for establishing a session with the target system, monitoring the session to detect any errors in transmission, and then recovering from those errors by retransmitting any data that went missing or was corrupt.
Explanation
Session mode is the correct answer because it refers to the communication mode used for connection-oriented communication. In this mode, NetBIOS is responsible for establishing a session with the target system, monitoring the session for errors, and recovering from those errors by retransmitting any missing or corrupt data.
6.
This communication mode Is used for connectionless communication in which a session is not needed. It also is used for any broadcast by NetBIOS. It does not support error detection and correction services, which are therefore the responsibility of the application using NetBIOS.
Explanation
Datagram mode is a communication mode that is used for connectionless communication, meaning that a session is not required. It is also used for any broadcast by NetBIOS. In this mode, error detection and correction services are not supported, so the responsibility of ensuring data integrity falls on the application using NetBIOS. Therefore, the correct answer is Datagram mode.
7.
______ is a routable protocol that was built by Novell and used in older version of Netware.
Explanation
IPX/SPX is a routable protocol developed by Novell and used in older versions of Netware. It stands for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX/SPX was primarily used for communication between computers in a local area network (LAN). It provided reliable and efficient data transmission by breaking data into smaller packets and ensuring their sequential delivery. However, with the emergence of TCP/IP as the dominant networking protocol, IPX/SPX has become less common and has been largely replaced by TCP/IP in modern networks.
8.
This protocol is responsible for the routing of packets, it is also a connectionless, unreliable transport.
Correct Answer
A. IPX
Explanation
IPX (Internetwork Packet Exchange) is the correct answer. IPX is a network layer protocol that is responsible for routing packets in a network. It is a connectionless and unreliable transport protocol, meaning it does not establish a connection before transmitting data and does not guarantee the delivery of packets. IPX was commonly used in Novell NetWare networks. SPX (Sequenced Packet Exchange) is a transport layer protocol that works in conjunction with IPX to provide reliable delivery of packets. However, the given statement does not mention SPX, making IPX the appropriate answer.
9.
This protocol is responsible for reliable delivery. It is a connection-oriented protocol that will ensure that packets that are not received at the destination are retransimitted on the wire.
Correct Answer
B. SPX
Explanation
SPX (Sequenced Packet Exchange) is a protocol that provides reliable delivery of packets. It is a connection-oriented protocol, meaning that it establishes a connection between the sender and receiver before transmitting data. SPX ensures reliable delivery by retransmitting any packets that are not received at the destination. Therefore, SPX fits the description given in the question, making it the correct answer.
10.
This protocol is a routable protocol that is used primarily in Macintosh environments to connect multiple systems together in a network environment. It was implemented in two phases, known as phase 1 and phase 2, with the second phase being more popular today.
Correct Answer
AppleTalk
Apple Talk
Explanation
AppleTalk is a routable protocol primarily used in Macintosh environments to connect multiple systems together in a network. It was implemented in two phases, phase 1 and phase 2, with the second phase being more widely used today.
11.
This phase of the AppleTalk protocol was designed for small workgroup environments and therefore supports a much smaller number of nodes on the network. It supports nonextended networks; each network segment is allowed to be assigned only a single network number, and only one zone is allowed in a nonextended network. A zone is a logical grouping of nodes—the network administrator will assign nodes to a particular zone.
Correct Answer
A. 1
Explanation
The correct answer is 1 because it accurately describes the phase of the AppleTalk protocol that was designed for small workgroup environments. This phase supports a smaller number of nodes on the network and allows only one network number to be assigned to each network segment. Additionally, it only allows for one zone in a nonextended network, which is a logical grouping of nodes that the network administrator assigns.
12.
This phase was designed for larger networks and supports more than 200 hosts on the network.It supports extended networks, thereby allowing one network segment to be assigned multiple network numbers and allowing for multiple zones on that network segment. Each node is part of a single zone on an extended network.
Correct Answer
B. 2
13.
This protocol is unsecure and requires configuration when installing. However, it can be used to connect dissimilar environments together.
Correct Answer
TCP/IP
Explanation
TCP/IP is a widely used network protocol suite that allows communication between different devices and networks. It is considered unsecure because it does not provide built-in encryption or authentication mechanisms. However, it can be configured to enhance security by implementing additional protocols or using encryption technologies. TCP/IP is also known for its ability to connect dissimilar environments, enabling communication between different operating systems and network architectures.
14.
This is the only protocol that is nonroutable.
Correct Answer
A. NetBEUI
Explanation
NetBEUI is the correct answer because it is the only protocol among the options that is nonroutable. This means that it cannot be used to communicate across different networks or subnets. NetBEUI is primarily designed for small local area networks (LANs) and does not have the capability to route data between different networks. In contrast, IPX/SPX, AppleTalk, and TCP/IP are all routable protocols that can be used for communication between different networks.
15.
OSI stands for _______ _________ ___________
Correct Answer
Open Systems Interconnect
Explanation
OSI stands for Open Systems Interconnect. The Open Systems Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. These layers work together to facilitate communication between different devices and networks. The OSI model provides a systematic approach to network design and troubleshooting by dividing the communication process into manageable and independent layers. The term "Interconnect" refers to the connection and interaction between these layers to ensure seamless communication.
16.
ISO stands for ________ _________ _________
Correct Answer
International Organization Standardization
International Organization for Standardization
the International Organization for Standardization
Explanation
Although the acronym is out of order the answer is correct!
17.
TCP is an example of a transport protocol responsible for:
Correct Answer
A. Reliable delivery
Explanation
TCP (Transmission Control Protocol) is a transport protocol that ensures reliable delivery of data over a network. It achieves this by using various mechanisms such as acknowledgement, retransmission, and flow control. TCP guarantees that data packets are delivered in the correct order and without errors, making it suitable for applications that require accurate and error-free transmission, such as web browsing, email, and file transfer.
18.
UDP is an example of a transport protocol responsible for:
Correct Answer
B. Unreliable delivery
Explanation
UDP (User Datagram Protocol) is a transport protocol that provides unreliable delivery of data. Unlike TCP, UDP does not guarantee that the data will be delivered successfully or in the correct order. It is a connectionless protocol that does not establish a dedicated connection before sending data. UDP is commonly used for applications that prioritize speed and efficiency over reliability, such as streaming media, online gaming, and DNS. Since it does not have the overhead of error checking and retransmission, UDP can deliver data with lower latency, but it also means that data may be lost or arrive out of order.
19.
A reliable dialog between two computers is called a ________________.
Correct Answer
session
Explanation
A session is just like a telephone call. You set up a telephone call by dialing (handshaking), speak to the other person (exchange data), say “Goodbye,” and hang up when finished.
20.
_____________ communication is a form of communication in which the sending system does not “introduce” itself—it just fires the data off. Also, the destination computer does not notify the source when the information is received. This type of communication can be unreliable because there is no notification to guarantee delivery. It can be faster than the other type of communication because the overhead of managing the session is not there, and after the information is sent, there is no second step to ensure proper receipt of information.
Correct Answer
Connectionless
Explanation
Connectionless communication is a form of communication where the sending system does not identify itself and simply transmits the data without any acknowledgment from the destination computer. This type of communication can be unreliable as there is no guarantee of delivery. However, it can be faster than connection-oriented communication because there is no overhead of managing the session and no need for a second step to ensure proper receipt of information. Therefore, the correct answer is "Connectionless."
21.
This type of communication means data is sent without acknowledgment of receipt.
Correct Answer
A. Unreliable
Explanation
This type of communication, known as unreliable, refers to the transmission of data without any acknowledgment of receipt. In this type of communication, there is no guarantee that the data will reach its intended destination or that it will be received correctly. It is called unreliable because there is a possibility of data loss or errors during transmission.
22.
This type of communication means that a session is not established before transmitting.
Correct Answer
B. Connectionless
Explanation
Connectionless communication refers to a mode of communication where a session is not established before transmitting data. In this type of communication, each packet is treated independently and does not require a dedicated connection or acknowledgment from the receiver. This approach allows for faster transmission and reduced overhead, making it suitable for applications where reliability is not a primary concern, such as streaming media or real-time communication.
23.
This protocol runs at layer 3 and 4 but the Network+ exam only considers layer 3 as the correct answer. It is not connection oriented. It is routable. It is an unreliable communication.
Correct Answer
A. IPX
Explanation
Remember, unreliable means data is sent without acknowledgment of receipt, and connectionless means that a session is not established before transmitting.
IPX = Internetwork Packet Exchange
24.
This protocol is a transport protocol used by IPX for connection-oriented communication. It is responsible for breaking the message into manageable packets and ensuring the data reaches the destination. It runs at layer 4.
Correct Answer
B. SPX
Explanation
SPX is the equivalent to TCP but for the IPX/SPX protocol suite.
SPX = Sequenced Packet Exchange
25.
This protocol is responsible for the logical addressing and routing of messages across the network. It does not ensure the delivery of the packets; that is the responsibility of higher-layer protocols, such as TCP.
This protocol is fully capable of running over either Token Ring or Ethernet networks.
It is a layer 3 protocol.
Correct Answer
C. IP
Explanation
The Internet Protocol (IP) in the TCP/IP protocol suite performs the same routing functions that IPX does for the IPX/SPX protocol suite.
IP = Internet Protocol
26.
This protocol is a transport-layer protocol that is responsible for breaking the data into manageable packets and ensuring that the packets reach their destination. It is considered a connection-oriented protocol, which means that it relies on a session being first established. This is different from a connectionless communication, which just sends the data out and if it reaches the destination, great; if not, no big deal. With connection-oriented protocols, a session is established through introductions. (“Hi, I’m Glen Clarke. Nice to meet you, I am going to send you some data.”) Connection-oriented protocols will monitor that session to ensure that the packets have reached their destination.
Correct Answer
D. TCP
Explanation
TCP = Transmission Control Protocol
27.
This protocol is part of the TCP/IP protocol suite and is the brother of TCP. When you send data on a TCP/IP network and if you need a connection-oriented conversation, you use the TCP protocol. But if you want to have a connectionless conversation you use this protocol. Both TCP and this protocol are layer 4 protocols. IP is used to deliver both types of data, but TCP and this protocol determine whether it is connection oriented or not.
Correct Answer
E. UDP
Explanation
UDP = User Datagram Protocol
28.
This protocol is a protocol for file sharing that enables a user to use network disks as though they were connected to the local machine. It was created by Sun Microsystems for use on Solaris, Sun’s version of UNIX. It is still used frequently in the UNIX and Linux worlds and is available for use with nearly all operating systems. It is a protocol that is used universally by the UNIX community. Vendor and third-party software products enable other operating systems to use it. It has gained acceptance with many companies and can be added to nearly any operating system. In addition to file sharing, it enables you to share printers. It is located in the application layer of the OSI model and is considered a member of the TCP/IP protocol suite. The primary reason to use it is to access resources located on a UNIX server or to share resources with someone working on a UNIX workstation.
Correct Answer
F. NFS
Explanation
NFS = Network File System
29.
These protocols are implemented in redirectors. A redirector is software that intercepts requests, formats them according to the protocol in use, and passes the message to a lower-level protocol for delivery. Redirectors also intercept incoming messages, process the instructions, and pass them to the correct upper-level application for additional processing.
They are used primarily for file and printer sharing in Microsoft and Novell networks, respectively, and are considered application-layer protocols.
Correct Answer
G. SMB and Novell NCP
Explanation
SMB = Microsoft's Server Message Block
NCP = Novell's NetWare Core Protocol
30.
This protocol defines the structure of Internet mail messages. It is a level 7 protocol.
Correct Answer
H. SMTP
Explanation
SMTP = Simple Mail Transport Protocol
31.
This protocol is a standardized method of transferring files between two machines. It is a connection-oriented protocol, which means that the protocol verifies that packets successfully reach their destinations.
This other, closely related protocol has the same purpose and function as the previous, except that it is not a connection-oriented protocol and does not verify that packets reach their destinations. By not verifying that data has been successfully transferred to its destination and therefore requiring less overhead to establish and maintain a connection, it is able to operate faster than the previous protocol. It has no authentication mechanism, whereas the previous protocol can require a username and password.
Correct Answer
I. FTP and TFTP
Explanation
FTP = File Transfer Protocol
TFTP = Trivial File Transfer Protocol
32.
This protocol is a proprietary protocol developed by the Digital Equipment Corporation for use primarily in WANs. You can run it on an Ethernet network, but it is done infrequently. It is a routable protocol.
Correct Answer
J. DECnet
Explanation
DECnet is a proprietary protocol developed by Digital Equipment Corporation (DEC) for use primarily in WANs. Although it can be run on an Ethernet network, it is not commonly done. DECnet is a routable protocol, meaning it can be used to route data between different network segments.
33.
This protocol is not a common protocol. It is a nonroutable protocol that was sometimes used to connect Windows NT servers to printers.
Correct Answer
K. DLC
Explanation
DLC = Data Link Control
34.
Which OSI layer does the FTP, SMTP, and Telnet protocols run in?
Correct Answer
A. Application
Explanation
The FTP, SMTP, and Telnet protocols are all application layer protocols. The application layer is responsible for providing network services to user applications. These protocols allow users to access and transfer files (FTP), send and receive emails (SMTP), and remotely log into and control a computer (Telnet). Therefore, these protocols run in the application layer of the OSI model.
35.
Which OSI layer does the JPEG, GIF, and MPEG protocols run in?
Correct Answer
B. Presentation
Explanation
The JPEG, GIF, and MPEG protocols run in the Presentation layer of the OSI model. This layer is responsible for the formatting, encryption, and compression of data. These protocols deal with the presentation and representation of multimedia data, such as images and videos, which aligns with the functionalities of the Presentation layer.
36.
Which OSI layer does the NFS and RPC protocols run in?
Correct Answer
C. Session
Explanation
The NFS (Network File System) and RPC (Remote Procedure Call) protocols run in the Session layer of the OSI model. The Session layer is responsible for establishing, managing, and terminating connections between applications. NFS allows remote systems to access files over a network, while RPC facilitates communication between different processes on a network. Both protocols rely on the Session layer to handle the establishment and maintenance of these connections, making Session the correct answer.
37.
Which OSI layer does the TCP, UDP, SPX, and IPX protocols run in?
Correct Answer
D. Transport
Explanation
TCP, UDP, SPX, and IPX protocols run in the Transport layer of the OSI model. The Transport layer is responsible for the end-to-end delivery of data between hosts and provides reliable or unreliable delivery of data packets. TCP (Transmission Control Protocol) is a reliable protocol that ensures the delivery and sequencing of data packets, while UDP (User Datagram Protocol) is an unreliable protocol that does not guarantee the delivery of data packets. SPX (Sequenced Packet Exchange) and IPX (Internetwork Packet Exchange) are protocols used in Novell NetWare networks. All of these protocols operate at the Transport layer for communication between applications on different hosts.
38.
Which OSI layer does the IPX and IP protocols run in?
Correct Answer
E. Network
Explanation
The IPX and IP protocols run in the Network layer of the OSI model. The Network layer is responsible for routing and forwarding data packets between different networks. IPX (Internetwork Packet Exchange) is a network layer protocol used by Novell NetWare operating systems, while IP (Internet Protocol) is a network layer protocol used for addressing and routing packets across the internet. Both protocols operate at the Network layer to ensure proper delivery of data packets between different networks.
39.
Which OSI layer does the Ethernet and Token Ring protocols run in?
Correct Answer
F. Data Link
Explanation
The Ethernet and Token Ring protocols run in the Data Link layer of the OSI model. This layer is responsible for the reliable transfer of data between two nodes on a network, providing error detection and correction, as well as flow control. The Data Link layer also handles the addressing of devices on the network, using MAC addresses. Therefore, it is the correct layer for these protocols to operate in.
40.
Which OSI layer handles the Twisted-pair, thinnet coax, AUI, and network interface card components?
Correct Answer
G. pHysical
Explanation
The Physical layer of the OSI model handles the Twisted-pair, thinnet coax, AUI, and network interface card components. This layer is responsible for the physical transmission of data over the network, including the electrical, mechanical, and functional aspects of the network interface. It defines the physical characteristics of the transmission medium, such as cables, connectors, and signaling. The Physical layer ensures that the bits sent from one device are received correctly by the other device.
41.
IEEE stands for The ________ of _______ and _________ _________.
Correct Answer
The Institute of Electrical and Electronics Engineers
Institute Electrical Electronics Engineers
Institute of Electrical and Electronics Engineers
Explanation
The Institute of Electrical and Electronics Engineers (IEEE) is a large and respected professional organization that is also active in defining standards. The 802 committee of the IEEE defines one set of standards dear to the hearts of most network professionals. Twelve subcommittees of the 802 committee define low-level LAN and WAN access protocols. Most of the protocols defined by the 802 committee reside in the physical and data link layers of the OSI model.
42.
Ethernet is defined by the __________ standard.
Correct Answer
IEEE 802.3
802.3
Explanation
Ethernet is a networking technology that is defined by the IEEE 802.3 standard. This standard specifies the physical and data link layer protocols for Ethernet networks. It outlines the specifications for the physical media, such as the cables and connectors used, as well as the protocols for data transmission and collision detection. Therefore, both "IEEE 802.3" and "802.3" are correct answers as they refer to the same standard that defines Ethernet.
43.
______ is the standard for Ethernet networks today.
Correct Answer
802.3
IEEE 802.3
Explanation
The standard for Ethernet networks today is 802.3, also known as IEEE 802.3. This standard defines the physical and data link layer specifications for Ethernet networks, including the wiring, signaling, and frame formats used in network communication. It ensures compatibility and interoperability between different Ethernet devices and allows for the transmission of data over local area networks (LANs) and wide area networks (WANs).
44.
The IEEE Project standard for Ethernet (CSMA/CD) is:
Correct Answer
A. 802.3
Explanation
The correct answer is 802.3. The IEEE Project standard for Ethernet (CSMA/CD) is 802.3, which specifies the physical and data link layer protocols for wired Ethernet networks. This standard defines the basic functions and characteristics of Ethernet networks, including the media access control (MAC) method, frame format, and data transmission rates. It is the foundation for Ethernet technology and is widely used in local area networks (LANs) and wide area networks (WANs).
45.
The IEEE Project standard for Fast Ethernet (100 Mbps) is:
Correct Answer
B. 802.3u
Explanation
The correct answer is 802.3u. The IEEE 802.3u standard is also known as Fast Ethernet, which operates at a speed of 100 Mbps. This standard was introduced to provide faster data transmission compared to the original Ethernet standard (802.3). It uses the same CSMA/CD (Carrier Sense Multiple Access with Collision Detection) media access control method as Ethernet but with a higher data rate. 802.3u is widely used in local area networks (LANs) and is backward compatible with Ethernet, allowing for seamless integration with existing network infrastructure.
46.
The IEEE Project standard for Gigabit Ethernet over fiber-optic cabling or coaxial cabling is:
Correct Answer
C. 802.3z
Explanation
The correct answer is 802.3z. The IEEE Project standard for Gigabit Ethernet over fiber-optic cabling or coaxial cabling is 802.3z. This standard specifies the physical layer and media access control for Gigabit Ethernet. It defines the requirements for transmission speeds of 1 gigabit per second over fiber-optic or coaxial cabling.
47.
The IEEE Project standard for Gigabit Ethernet over twisted-pair cabling is:
Correct Answer
D. 802.3ab
Explanation
The correct answer is 802.3ab. This standard refers to the implementation of Gigabit Ethernet over twisted-pair cabling, specifically using the 1000BASE-T physical layer specification. It allows for high-speed data transmission over copper cables, making it widely used in modern networking environments.
48.
The IEEE Project standard for 10-Gigabit Ethernet is:
Correct Answer
E. 802.3ae
Explanation
The correct answer is 802.3ae. This standard is specifically designed for 10-Gigabit Ethernet, which is a high-speed Ethernet technology that supports data transfer rates of up to 10 gigabits per second. The 802.3ae standard defines the physical layer and the media access control (MAC) layer specifications for 10-Gigabit Ethernet, ensuring compatibility and interoperability between different networking devices.
49.
This 802.11 project category supports speeds of 54 Mbps at frequencies ranging from 5.725 GHz to 5.850 GHz. This category's wireless components are not compatible with 802.11b devices.
Correct Answer
A. 802.11a
Explanation
The correct answer is 802.11a. This category of the 802.11 project supports speeds of 54 Mbps and operates at frequencies ranging from 5.725 GHz to 5.850 GHz. It is not compatible with 802.11b devices, which operate at a different frequency range.
50.
This 802.11 project category supports speeds of 11 Mbps at frequency ranges of 2.400 GHz to 2.4835 GHz. This category's wireless components are compatible with 802.11g devices, which use an enhancement of this standard.
Correct Answer
B. 802.11b
Explanation
The correct answer is 802.11b. This category supports speeds of 11 Mbps and operates at a frequency range of 2.400 GHz to 2.4835 GHz. It is compatible with 802.11g devices, which use an enhanced version of the 802.11b standard.