Answers To CTS Unit 7 Lab 7-2: Protocols And Services SNMP
Which of the following are available protocols for security purposes? (Choose all that apply.)
TLS
NetBIOS
SSL
IPSec
SSH
Answer: TLS, SSL, IPSec, SSH
Which of the following are available protocols for security purposes? (Choose all that apply.)
Answer: TLS, SSL, IPSec, SSH
Which of the following services only requires a single port be opened on the firewall?
Answer: HTTP
SNMP uses which port by default?
Answer: 161
Which of these is a valid byte? Check all that apply. 11100 11011011 00000000 10022011
Answer: 11011011 00000000
How many possible values can we have with 8 bits? 256 127 1 byte 8
Answer: 256
Why did UTF-8 replace the ASCII character-encoding standard?
UTF-8 can store a character in more than one byte. ASCII can store a character in more than one byte. ASCII can represent emoji. UTF-8 only uses 128 values.
Answer: UTF-8 can store a character in more than one byte.
What is the highest decimal value we can represent with a byte?
Any number 255 256 2
Answer: 255
Where does the CPU store its computations?
External Data Bus Processor Registers Binary
Answer: Registers
Which mechanisms do we use to transport binary data and memory addresses?
Check all that apply. The External Data Bus Address Bus DBus School Bus
Answer: The External Data Bus Address Bus
What characteristics distinguish a Solid State Drive from a Hard Disk Drive?
Check all that apply. Non-moving parts Smaller form factor High RPMs Uses Disk Platters
Answer: Non-moving parts Smaller form factor
True or false: If you plug in a 220v appliance into a 120v outlet, the appliance could get damaged.
TRUE FALSE
Answer: TRUE
How long will it take to transfer a file size of 1GB on a USB 2.0 and a USB 3.0 drive?
~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive ~17 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive ~ 17 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive ~ 20 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive
Answer: ~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
What is the difference between a ROM chip and a RAM chip?
Check all that apply. A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure. A ROM chip is volatile and will wipe its data in the case of a power failure. A RAM chip is non-volatile and will keep its data in the case of a power failure. A ROM chip stores temporary data. A RAM chip stores permanent data. A ROM chip stores permanent data. A RAM chip stores temporary data.
Answer: A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure. A ROM chip stores permanent data. A RAM chip stores temporary data.
Which of these functions does the BIOS perform?
Check all that apply. Installs drivers POST Checks what devices are connected to the computer Initializes hardware
Answer: POST Checks what devices are connected to the computer Initializes hardware
Where are your BIOS settings stored?
Flash drive Hard drive CMOS chip RAM
Answer: CMOS chip
What is the difference between a traditional BIOS and UEFI?
Check all that apply. UEFI has better compatiblity with newer hardware. UEFI has become the default BIOS on new systems. A traditional BIOS has better compatibility with newer hardware. UEFI is meant to become the new standard for BIOS.
Answer: UEFI has better compatiblity with newer hardware.
UEFI has become the default
BIOS on new systems.
UEFI is meant to become the new standard for BIOS.
What are the two main parts that make up an operating system?
Kernel and Userspace Users and Software Kernel and Packages Windows and Mac
Answer: Kernel and Userspace
What are the main components of file management?
Check all that apply. File data NTFS Metadata File system
Answer: File data Metadata File system
Which of these are true?
Check all that apply. You can have many processes running for one program. A program is a process that is executed.
A process is a program that we can run. A program is an application that we can run. A process is a program that is executed. A program is initially stored in RAM. A process is initially stored in the hard drive.
Answer: You can have many processes running for one program. A program is an application that we can run. A process is a program that is executed.
What are the characteristics of virtual memory?
Check all that apply. Stores pages that are currently not in use by physical memory. Allows our computer to have more memory than it physically has. It is where we store pages that are being executed Combination of RAM and hard drive space.
Answer: Stores pages that are currently not in use by physical memory. Allows our computer to have more memory than it physically has. Combination of RAM and hard drive space.
Which of the following devices are used in networking? Check all that apply. Switches Hubs Routers TCP
Answer: Switches Hubs Routers
Which one of these are a valid IPv4 address? Check all that apply. 255.255.255.0 1.1.1.1 54.45.43.54 345.0.24.6
Answer: 255.255.255.0 1.1.1.1 54.45.43.54
Which network protocol is used to handle the reliable delivery of information? TCP UDP IP ICMP
Answer: TCP
What is known as networking in the IT field?
Check all that apply. Designing networks
Managing networks Building networks Joining professional networks
Answer: Designing networks Managing networks Building networks
Through which of the devices listed are we able to connect to wireless networks? Check all that apply. Radio Smart TV Antenna Telephone
Answer: Radio Antenna
What type of address do computers use to find something on a network?
IP address MAC address ISP address URL address
Answer: IP address
You’re browsing the Web, and type in www.Coursera.com in the address line. Instead of the website, an error screen appears. You type in 54.174.155.206, and the Coursera website comes up. What’s the most likely reason for this?
Address line is for the IP address only, not the domain name. There’s a problem with your Internet connection. Web addresses must be entered in lowercase. There’s a problem in your network’s DNS configuration.
Answer: There’s a problem in your network’s DNS configuration.
What was the biggest problem with the earliest version of the Internet in the late 1960s?
Networks couldn’t talk to each other. The TCP/IP protocol could only be used in universities, governments, and businesses. There was no way to remotely access any computer. Computers were too big and bulky for accessing the Internet.
Answer: Networks couldn’t talk to each other.
You need to update your router settings, so you log into the administration panel, whose Internet Protocol (IP) address is 192.168.0.1. Which IP version is this?
IPv4 IPv6 IPv1 IPv2
Answer: IPv4
What are some examples of IoT (Internet of Things)?
Check all that apply. An online car dealership that can provide complete car history using the vehicle identification number Refrigerators that keep track of the food and notify you when to buy more Teachers who post assignments for their students on the school website Thermostats that turn off the air conditioning when you leave the room
Answer: Refrigerators that keep track of the food and notify you when to buy more Thermostats that turn off the air conditioning when you leave the room
What do we call data that’s broken down into bits and sent through a network? Memory Binary Pages Packets
Answer: Packets
What are some of the ways we can resolve IPv4 address shortages?
Check all that apply. Border Gateway Protocol Network Address Translation Using IPv6 addresses Autonomous Systems
Answer: Network Address Translation Using IPv6 addresses
Which statement is true about the Internet and the World Wide Web?
The Internet is the World Wide Web. The World Wide Web is a way to access the Internet. The Internet is a way to access the World Wide Web. The World Wide Web is the only way to access the Internet.
Answer: The World Wide Web is a way to access the Internet.
Which one of these can connect directly to the Internet?
Servers Packets Internet users Clients
Answer: Servers
Which problem does IPv6 (Internet Protocol version 6) help to solve?
There are less than 4.3 billion IPv4 addresses, which has already been exceeded with existing websites. Companies waste hundreds of public IP addresses. With IPv6, they can use just one IP address. IPv5 is an outdated protocol version with insufficient security safeguards. Internet Protocol versions prior to version 6 haven’t achieved widespread use.
Answer: There are less than 4.3 billion IPv4 addresses, which has already been exceeded with existing websites.
What are some examples of the impact of the Internet boom?
Check all that apply. We can sell used items to people outside of our local regions. We can travel around the world faster than we did 100 years ago. We can attend a university from our homes. We have instant 24-hour access to news and entertainment.
Answer: We can sell used items to people outside of our local regions. We can attend a university from our homes. We have instant 24-hour access to news and entertainment.
Which statement is true about computer security?
Computer security is only necessary for governments and big businesses. Computer security is everyone’s responsibility. Computer security is the job of specialized security engineers. Computer security does not affect the gaming industry.
Answer: Computer security is everyone’s responsibility.
Which of the following cables are used in networking?
Check all that apply. Auxilary cable Fiber optic cable HDMI cable Ethernet
Answer: Fiber optic cable Ethernet
True or false: You can create a network with two computers. TRUE FALSE
Answer: TRUE
What protocol allows us to use a domain name like google.com instead of an IP address?
NAT TCP/IP DNS ICMP
Answer: DNS
You want to register the domain name ABCcompany.org, but the registration service is not allowing you to do that. What’s the most likely reason for this?
The domain name is registered to someone else. Domain names must end in “.com”. You are not the legal owner of ABC Company. Domain names must be all in lowercase.
Answer: The domain name is registered to someone else.
Which Internet Protocol version is 100.0.0.256?
Not a valid IP address IPv2 IPv6 IPv4
Answer: Not a valid IP address
What are the drawbacks of purchasing something online?
Check all that apply. Product selection is not as big as what’s available in physical store locations. Someone can use your photographs in their own business and not share the profits with you. Personal buying preferences can be tracked and used to bombard you with excessive marketing. Confidential information like your credit card number can be stolen and used by someone else.
Answer: Personal buying preferences can be tracked and used to bombard you with excessive marketing. Confidential information like your credit card number can be stolen and used by someone else.
What is www.google.com an example of?
URL ICANN ISP HTTP
Answer: URL
Devices on a network are identified by which of the following?
MAC address and IP address ISPs and IP addresses Username and IP addresses Ethernet cable
Answer: MAC address and IP address
You’re having trouble connecting to the Internet, so you call your Internet Service Provider for help. They need to know the permanent unique identifier of your networking device, to help them troubleshoot. What are they asking for?
URL address ISP address MAC address IP address
Answer: MAC address
Which statements are true about routers?
Check all that apply. A router utilizes network protocols to help determine where to send data packets. A router is a set of components that makes up computer networking. A router can only send data to another computer that’s on the same network. A router connects devices together and helps direct network traffic.
Answer: A router utilizes network protocols to help determine where to send data packets. A router connects devices together and helps direct network traffic.
What was the main limitation of computer networking that the invention of the World Wide Web solved in the 1990s?
The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another. Networks couldn’t talk to each other. People could only receive the information in the form of text.
Answer: network couldnt talk to each other
Which protocol is used to handle delivery of information from one network to another?
Internet Protocol File Transfer Protocol Transmission Control Protocol Hyper Text Transfer Protocol
Answer: Transmission Control Protocol
Which network protocol is used to route IP addresses?
TCP UDP IP ICMP
Answer: IP
Which of these is application software?
Check all that apply. Web browser CPU Email client RAM
Answer: Web browser Email client
Which of these is system software?
Check all that apply. CPU Windows OS BIOS Text editor
Answer: Windows OS BIOS
What is the difference between an interpreted and a compiled language?
Check all that apply Interpreted languages are broken into machine instructions beforehand. Interpreted languages are not broken into machine instructions beforehand. Compiled languages are translated into machine instructions beforehand. Compiled languages are not translated into machine instructions beforehand.
Answer: Interpreted languages are not broken into machine instructions beforehand. Compiled languages are translated into machine instructions beforehand.
In the Linux distribution Ubuntu, what command would you use to install an application?
run application apt execute
Answer: apt
What are the four layers of the computer architecture?
Binary, Hardware, Operating System, Software Hardware, Operating System, Software, User Hardware, Windows, Software, User Computer, Operating System, Software, User
Answer: Hardware, Operating System, Software, User
True or false: If you have a 32-bit CPU architecture, it’s recommended to use a 64-bit operating system.
TRUE
FALSE
Answer: FALSE
If you want to boot into a USB drive, how do you change your boot settings?
Replace the CPU. Login to the machine. Go into the BIOS settings and change the boot settings Wipe the computer.
Answer: Go into the BIOS settings and change the boot settings
What is the file manager in macOS called? Finder File Explorer Konqueror Midnight Commander
Answer: Finder
What command can you use to create a file using bash?
cat ls touch mkfile
Answer: touch
A ____ is an emulation of a physical machine. BIOS virtual machine driver kernel
Answer: virtual machine
True or false: The Internet is the World Wide Web.
TRUE FALSE
Answer: FALSE
What is the fundamental protocol that the Internet uses today?
HTTP FTP DHCP TCP/IP
Answer: TCP/IP
True or false: You should only worry about computer security if you work in a computer security role.
TRUE
FALSE
Answer: FALSE
There are 4 bytes in an IPv4 address. What is the highest decimal value you can have for one byte?
128 255 256 512
Answer: 255
Which of the following protocols is the primary infrastructure that creates the Internet?
DNS NAT HTML TCP/IP
Answer: TCP/IP