I Hate CBT's

View Original

Answers To CTS Unit 7 Lab 7-2: Protocols And Services SNMP

Which of the following are available protocols for security purposes? (Choose all that apply.)


TLS


NetBIOS


SSL


IPSec


SSH


Answer: TLS, SSL, IPSec, SSH



Which of the following are available protocols for security purposes? (Choose all that apply.)

Answer: TLS, SSL, IPSec, SSH


Which of the following services only requires a single port be opened on the firewall?

Answer: HTTP


SNMP uses which port by default?

Answer: 161


Which of these is a valid byte? Check all that apply. 11100 11011011 00000000 10022011

Answer: 11011011 00000000


How many possible values can we have with 8 bits? 256 127 1 byte 8

Answer: 256


Why did UTF-8 replace the ASCII character-encoding standard?

 UTF-8 can store a character in more than one byte. ASCII can store a character in more than one byte. ASCII can represent emoji. UTF-8 only uses 128 values.


Answer: UTF-8 can store a character in more than one byte.


What is the highest decimal value we can represent with a byte? 

Any number 255 256 2


Answer: 255


Where does the CPU store its computations? 

External Data Bus Processor Registers Binary


Answer: Registers


Which mechanisms do we use to transport binary data and memory addresses?

 Check all that apply. The External Data Bus Address Bus DBus School Bus


Answer: The External Data Bus Address Bus


What characteristics distinguish a Solid State Drive from a Hard Disk Drive?

 Check all that apply. Non-moving parts Smaller form factor High RPMs Uses Disk Platters


Answer: Non-moving parts Smaller form factor


True or false: If you plug in a 220v appliance into a 120v outlet, the appliance could get damaged. 

TRUE FALSE


Answer: TRUE


How long will it take to transfer a file size of 1GB on a USB 2.0 and a USB 3.0 drive?

 ~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive ~17 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive ~ 17 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive ~ 20 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive


Answer: ~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive


What is the difference between a ROM chip and a RAM chip?

 Check all that apply. A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure. A ROM chip is volatile and will wipe its data in the case of a power failure. A RAM chip is non-volatile and will keep its data in the case of a power failure. A ROM chip stores temporary data. A RAM chip stores permanent data. A ROM chip stores permanent data. A RAM chip stores temporary data.


Answer: A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure. A ROM chip stores permanent data. A RAM chip stores temporary data.


Which of these functions does the BIOS perform?

 Check all that apply. Installs drivers POST Checks what devices are connected to the computer Initializes hardware


Answer: POST Checks what devices are connected to the computer Initializes hardware


Where are your BIOS settings stored? 

Flash drive Hard drive CMOS chip RAM

Answer: CMOS chip


What is the difference between a traditional BIOS and UEFI?

 Check all that apply. UEFI has better compatiblity with newer hardware. UEFI has become the default BIOS on new systems. A traditional BIOS has better compatibility with newer hardware. UEFI is meant to become the new standard for BIOS.


Answer: UEFI has better compatiblity with newer hardware. 

UEFI has become the default 

BIOS on new systems. 

UEFI is meant to become the new standard for BIOS.


What are the two main parts that make up an operating system? 

Kernel and Userspace Users and Software Kernel and Packages Windows and Mac


Answer: Kernel and Userspace


What are the main components of file management? 

Check all that apply. File data NTFS Metadata File system


Answer: File data Metadata File system


Which of these are true? 

Check all that apply. You can have many processes running for one program. A program is a process that is executed.

 A process is a program that we can run. A program is an application that we can run. A process is a program that is executed. A program is initially stored in RAM. A process is initially stored in the hard drive.


Answer: You can have many processes running for one program. A program is an application that we can run. A process is a program that is executed.


What are the characteristics of virtual memory?

Check all that apply. Stores pages that are currently not in use by physical memory. Allows our computer to have more memory than it physically has. It is where we store pages that are being executed Combination of RAM and hard drive space.


Answer: Stores pages that are currently not in use by physical memory. Allows our computer to have more memory than it physically has. Combination of RAM and hard drive space.


Which of the following devices are used in networking? Check all that apply. Switches Hubs Routers TCP

Answer: Switches Hubs Routers


Which one of these are a valid IPv4 address? Check all that apply. 255.255.255.0 1.1.1.1 54.45.43.54 345.0.24.6

Answer: 255.255.255.0 1.1.1.1 54.45.43.54


Which network protocol is used to handle the reliable delivery of information? TCP UDP IP ICMP

Answer: TCP


What is known as networking in the IT field? 

Check all that apply. Designing networks 

Managing networks Building networks Joining professional networks


Answer: Designing networks Managing networks Building networks


Through which of the devices listed are we able to connect to wireless networks? Check all that apply. Radio Smart TV Antenna Telephone


Answer: Radio Antenna


What type of address do computers use to find something on a network?

 IP address MAC address ISP address URL address


Answer: IP address


You’re browsing the Web, and type in www.Coursera.com in the address line. Instead of the website, an error screen appears. You type in 54.174.155.206, and the Coursera website comes up. What’s the most likely reason for this?

 Address line is for the IP address only, not the domain name. There’s a problem with your Internet connection. Web addresses must be entered in lowercase. There’s a problem in your network’s DNS configuration.


Answer: There’s a problem in your network’s DNS configuration.


What was the biggest problem with the earliest version of the Internet in the late 1960s? 

Networks couldn’t talk to each other. The TCP/IP protocol could only be used in universities, governments, and businesses. There was no way to remotely access any computer. Computers were too big and bulky for accessing the Internet.


Answer: Networks couldn’t talk to each other.


You need to update your router settings, so you log into the administration panel, whose Internet Protocol (IP) address is 192.168.0.1. Which IP version is this?

 IPv4 IPv6 IPv1 IPv2


Answer: IPv4


What are some examples of IoT (Internet of Things)? 

Check all that apply. An online car dealership that can provide complete car history using the vehicle identification number Refrigerators that keep track of the food and notify you when to buy more Teachers who post assignments for their students on the school website Thermostats that turn off the air conditioning when you leave the room


Answer: Refrigerators that keep track of the food and notify you when to buy more Thermostats that turn off the air conditioning when you leave the room


What do we call data that’s broken down into bits and sent through a network? Memory Binary Pages Packets


Answer: Packets


What are some of the ways we can resolve IPv4 address shortages? 

Check all that apply. Border Gateway Protocol Network Address Translation Using IPv6 addresses Autonomous Systems


Answer: Network Address Translation Using IPv6 addresses


Which statement is true about the Internet and the World Wide Web?

 The Internet is the World Wide Web. The World Wide Web is a way to access the Internet. The Internet is a way to access the World Wide Web. The World Wide Web is the only way to access the Internet.


Answer: The World Wide Web is a way to access the Internet.


Which one of these can connect directly to the Internet? 

Servers Packets Internet users Clients


Answer: Servers


Which problem does IPv6 (Internet Protocol version 6) help to solve? 

There are less than 4.3 billion IPv4 addresses, which has already been exceeded with existing websites. Companies waste hundreds of public IP addresses. With IPv6, they can use just one IP address. IPv5 is an outdated protocol version with insufficient security safeguards. Internet Protocol versions prior to version 6 haven’t achieved widespread use.


Answer: There are less than 4.3 billion IPv4 addresses, which has already been exceeded with existing websites.


What are some examples of the impact of the Internet boom? 

Check all that apply. We can sell used items to people outside of our local regions. We can travel around the world faster than we did 100 years ago. We can attend a university from our homes. We have instant 24-hour access to news and entertainment.


Answer: We can sell used items to people outside of our local regions. We can attend a university from our homes. We have instant 24-hour access to news and entertainment.


Which statement is true about computer security? 

Computer security is only necessary for governments and big businesses. Computer security is everyone’s responsibility. Computer security is the job of specialized security engineers. Computer security does not affect the gaming industry.


Answer: Computer security is everyone’s responsibility.


Which of the following cables are used in networking?

 Check all that apply. Auxilary cable Fiber optic cable HDMI cable Ethernet

Answer: Fiber optic cable Ethernet

True or false: You can create a network with two computers. TRUE FALSE


Answer: TRUE


What protocol allows us to use a domain name like google.com instead of an IP address? 

NAT TCP/IP DNS ICMP


Answer: DNS


You want to register the domain name ABCcompany.org, but the registration service is not allowing you to do that. What’s the most likely reason for this? 

The domain name is registered to someone else. Domain names must end in “.com”. You are not the legal owner of ABC Company. Domain names must be all in lowercase.


Answer: The domain name is registered to someone else.


Which Internet Protocol version is 100.0.0.256?

 Not a valid IP address IPv2 IPv6 IPv4


Answer: Not a valid IP address




What are the drawbacks of purchasing something online? 

Check all that apply. Product selection is not as big as what’s available in physical store locations. Someone can use your photographs in their own business and not share the profits with you. Personal buying preferences can be tracked and used to bombard you with excessive marketing. Confidential information like your credit card number can be stolen and used by someone else.


Answer: Personal buying preferences can be tracked and used to bombard you with excessive marketing. Confidential information like your credit card number can be stolen and used by someone else.


What is www.google.com an example of? 

URL ICANN ISP HTTP


Answer: URL


Devices on a network are identified by which of the following? 

MAC address and IP address ISPs and IP addresses Username and IP addresses Ethernet cable


Answer: MAC address and IP address


You’re having trouble connecting to the Internet, so you call your Internet Service Provider for help. They need to know the permanent unique identifier of your networking device, to help them troubleshoot. What are they asking for?

 URL address ISP address MAC address IP address


Answer: MAC address


Which statements are true about routers? 

Check all that apply. A router utilizes network protocols to help determine where to send data packets. A router is a set of components that makes up computer networking. A router can only send data to another computer that’s on the same network. A router connects devices together and helps direct network traffic.


Answer: A router utilizes network protocols to help determine where to send data packets. A router connects devices together and helps direct network traffic.


What was the main limitation of computer networking that the invention of the World Wide Web solved in the 1990s? 

The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another. Networks couldn’t talk to each other. People could only receive the information in the form of text.


Answer: network couldnt talk to each other


Which protocol is used to handle delivery of information from one network to another?

 Internet Protocol File Transfer Protocol Transmission Control Protocol Hyper Text Transfer Protocol


Answer: Transmission Control Protocol



Which network protocol is used to route IP addresses? 

TCP UDP IP ICMP


Answer: IP


Which of these is application software? 

Check all that apply. Web browser CPU Email client RAM


Answer: Web browser Email client


Which of these is system software? 


Check all that apply. CPU Windows OS BIOS Text editor


Answer: Windows OS BIOS


What is the difference between an interpreted and a compiled language? 

Check all that apply Interpreted languages are broken into machine instructions beforehand. Interpreted languages are not broken into machine instructions beforehand. Compiled languages are translated into machine instructions beforehand. Compiled languages are not translated into machine instructions beforehand.


Answer: Interpreted languages are not broken into machine instructions beforehand. Compiled languages are translated into machine instructions beforehand.


In the Linux distribution Ubuntu, what command would you use to install an application?

 run application apt execute


Answer: apt


What are the four layers of the computer architecture? 

Binary, Hardware, Operating System, Software Hardware, Operating System, Software, User Hardware, Windows, Software, User Computer, Operating System, Software, User


Answer: Hardware, Operating System, Software, User


True or false: If you have a 32-bit CPU architecture, it’s recommended to use a 64-bit operating system.

 TRUE

 FALSE


Answer: FALSE


If you want to boot into a USB drive, how do you change your boot settings?

 Replace the CPU. Login to the machine. Go into the BIOS settings and change the boot settings Wipe the computer.

Answer: Go into the BIOS settings and change the boot settings


What is the file manager in macOS called? Finder File Explorer Konqueror Midnight Commander

Answer: Finder


What command can you use to create a file using bash?

cat ls touch mkfile


Answer: touch


A ____ is an emulation of a physical machine. BIOS virtual machine driver kernel

Answer: virtual machine


True or false: The Internet is the World Wide Web. 

TRUE FALSE


Answer: FALSE


What is the fundamental protocol that the Internet uses today?

 HTTP FTP DHCP TCP/IP


Answer: TCP/IP


True or false: You should only worry about computer security if you work in a computer security role.

 TRUE 

FALSE


Answer: FALSE


There are 4 bytes in an IPv4 address. What is the highest decimal value you can have for one byte? 

128 255 256 512


Answer: 255


Which of the following protocols is the primary infrastructure that creates the Internet? 

DNS NAT HTML TCP/IP


Answer: TCP/IP