Christopher Griffin
Quiz by , created more than 1 year ago

101 - Application Delivery F5 (101 - Application Delivery) Quiz on F5 Application Delivery Fundementals (101) - Section 1 - OSI , created by Christopher Griffin on 20/11/2016.

95
1
0
Christopher Griffin
Created by Christopher Griffin over 7 years ago
Close

F5 Application Delivery Fundementals (101) - Section 1 - OSI

Question 1 of 74

1

What does OSI stand for?

Select one of the following:

  • Open System Interconnection

  • Overlay standard industry

  • Open standard industry

  • Overlay system interconnection

Explanation

Question 2 of 74

1

What layer is not part of the OSI model upper layers?

Select one of the following:

  • The Application Layer

  • The Network Layer

  • The Presentation Layer

  • The Session Layer

Explanation

Question 3 of 74

1

What are the OSI model lower layers?

Select one of the following:

  • Transport Layer, Network Layer, Data-Link Layer, and Physical Layer

  • Application Layer, Presentation Layer, and Physical Layer

  • Data-Link Layer, Network Layer, Session Layer, Application Layer

Explanation

Question 4 of 74

1

What are the roles of the application layer?

Select one of the following:

  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).

  • Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand

  • Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts

  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).

Explanation

Question 5 of 74

1

What are the roles of the presentation layer?

Select one of the following:

  • Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts

  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).

  • Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand

  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).

Explanation

Question 6 of 74

1

What are the roles of the Transport Layer?

Select one of the following:

  • Takes the data from each application, and integrates it all into a single stream maintaining flow control

  • Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer

  • Establish a session with the receiving host;sessions are established between applications

  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).

Explanation

Question 7 of 74

1

What are the roles of the session Layer?

Select one of the following:

  • Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand

  • Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer

  • Establish a session with the receiving host; sessions are established between applications

  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).

Explanation

Question 8 of 74

1

What are the roles of the Network Layer?

Select one of the following:

  • Determines how the data will reach the recipient - creates logical paths, known as virtual circuits, between the source and destination hosts

  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).

  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).

  • Establish a session with the receiving host;sessions are established between applications

Explanation

Question 9 of 74

1

What are the roles of the Data Link Layer?

Select one of the following:

  • Takes the data that is provided by the upper layer, and converts it into a standard format that the other layers can understand

  • Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer

  • Takes the data from each application, and integrates it all into a single stream maintaining flow control

  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).

Explanation

Question 10 of 74

1

What are the roles of the Physical Layer?

Select one of the following:

  • Provides the framework that the actual applications run on top of (Human-Machine readable interface).

  • Establish a session with the receiving host; sessions are established between applications

  • Defines the hardware specifications used by network adapters and by the network cables (assuming that the connection is not wireless).

  • Sub divided into two other layers; the Media Access Control (MAC) layer, and the Logical Link Control (LLC) layer

Explanation

Question 11 of 74

1

Provides application services for file transfers, e-mail, and other network software services.

Select one of the following:

  • Application Layer

  • Presentation Layer

  • Network Layer

  • Physical Layer

Explanation

Question 12 of 74

1

This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

Select one of the following:

  • Presentation Layer

  • Application Layer

  • Network Layer

  • Physical Layer

Explanation

Question 13 of 74

1

Responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

Select one of the following:

  • Session Layer

  • Application Layer

  • Transport Layer

  • Physical Layer

Explanation

Question 14 of 74

1

Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

Select one of the following:

  • Physical Layer

  • Network Layer

  • Presentation Layer

  • Transport Layer

Explanation

Question 15 of 74

1

Provides error-free transfer of data frames from one node to another over the physical layer.

Select one of the following:

  • Transport Layer

  • Application Layer

  • Session Layer

  • Data-Link Layer

Explanation

Question 16 of 74

1

What are the address types at Layer 1

Select one or more of the following:

  • Hubs, Repeaters, Cables

  • TCP, SPX and UDP

  • Twisted Pair Cable and Connectors

  • IPv4, IPV6, IPX

Explanation

Question 17 of 74

1

What are the two sublayers of Layer2

Select one or more of the following:

  • Media Access Control (MAC) layer

  • Open System Interconnection (OSI)

  • 802.3u

  • Logical Link Control (LLC) layer

Explanation

Question 18 of 74

1

What are the address types at Layer 2

Select one of the following:

  • 802.11 (WLAN), Wi-Fi, WiMAX

  • TCP, SPX and UDP

  • SSL, WEP, WPA

  • SONET/SDN,Coaxial Cable, Twisted Pair Cable

Explanation

Question 19 of 74

1

What are the address types at Layer 3

Select one of the following:

  • TCP, SPX and UDP

  • OSPF, ICMP, IGMP and ARP

  • SNMP, SSH, TELNET and NTP

  • Logical Ports 21, 22, 23, 80 etc

Explanation

Question 20 of 74

1

What are the address types at Layer 4

Select one of the following:

  • TCP, SPX and UDP

  • DHCP, DNS, FTP, HTTP

  • Optical Fiber, SONET/SDN,Coaxial Cable

  • IPv4, IPV6, IPX

Explanation

Question 21 of 74

1

What are the address types at Layer 5

Select one of the following:

  • Ethernet, Token Ring, Frame Relay, PPTP, L2TP and ISDN

  • Logical Ports 21, 22, 23, 80 etc.

  • SSL, WEP, WPA, Kerberos,

  • ICMP, IGMP and ARP

Explanation

Question 22 of 74

1

What are the address types at Layer 6

Select one of the following:

  • SSL, WEP, WPA, Kerberos,

  • IPv4, IPV6, IPX,

  • Frame Relay, PPTP, L2TP and ISDN

  • DHCP, DNS, FTP, HTTP

Explanation

Question 23 of 74

1

What are the address types at Layer 7

Select one of the following:

  • Hubs, Repeaters, Cables, Optical Fiber,

  • IPv4, IPV6, IPX, OSPF, ICMP, IGMP and ARP

  • Twisted Pair Cable and Connectors

  • DHCP, DNS, FTP, HTTP

Explanation

Question 24 of 74

1

What is the purpose of address resolution protocol (ARP)

Select one of the following:

  • used to locate the Ethernet address associated with a desired IP address

  • the area of the computer network that consists of every single computer

  • special broadcast address consisting of all used to send frames to all devices on the network

  • virtual broadcast domain created inside a switch

Explanation

Question 25 of 74

1

How many bytes are comprised in an hardware address (MAC address)?

Select one of the following:

  • 6 Bytes

  • 4 Bytes

  • 48 Bits

  • 128 Bytes

Explanation

Question 26 of 74

1

LACP is a protocol that detects error conditions on member links and redistributes traffic to other member links, thus preventing any loss of traffic on the failed link.

Select one of the following:

  • True
  • False

Explanation

Question 27 of 74

1

How many bits are dedicated to organization unique identifier (OUI)?

Select one of the following:

  • 24 bits

  • 24 Bytes

  • 3 octets

Explanation

Question 28 of 74

1

What is the "I/G" bit in the hardware address?

Select one of the following:

  • signifies whether the hardware address represents an individual device or a group of devices

  • resolves MAC addresses into IP addresses.

  • signifies support for half duplex Ethernet adds frame bursting and carrier extension

Explanation

Question 29 of 74

1

BIG-IP system uses a what technology to distribute traffic across multiple links. What is the process?

Select one of the following:

  • Multi-Port

  • Trunk

  • logical link

  • BIG Links

Explanation

Question 30 of 74

1

BIG IP assigns MAC address from the lowest-numbered interface of the trunk.

Select one of the following:

  • True
  • False

Explanation

Question 31 of 74

1

BIG-IP uses what trunk protocol?

Select one of the following:

  • ISL

  • LACP

  • None

  • VTP

Explanation

Question 32 of 74

1

Indicates the cost of using a route, which is typically the number of hops to the IP destination.

Select one of the following:

  • Metric

  • Gateway

  • Interface

  • VLAN

Explanation

Question 33 of 74

1

The IP address that the local host uses to forward IP datagrams to other IP networks.

Select one of the following:

  • Gateway

  • Interface

  • Metric

Explanation

Question 34 of 74

1

Routing protocols perform several activities, including:

Select one or more of the following:

  • Network discovery

  • Updating and maintaining routing tables

  • Frame Filtering

  • ARP

Explanation

Question 35 of 74

1

Remote networks are added to the routing table in two ways:

Select one or more of the following:

  • By the network administrator manually configuring static routes.

  • By implementing a dynamic routing protocol.

  • By waiting for application to tell the network about IP address

  • By email from host to host

Explanation

Question 36 of 74

1

Select dynamic routing protocols:

Select one or more of the following:

  • OSPF

  • IS-IS

  • Static routing

  • IGP

  • BGP

Explanation

Question 37 of 74

1

Fragmentation happens when a large IP datagram has to travel through a network with a maximum transmission unit (MTU) that is smaller than the size of the IP datagram.

Select one of the following:

  • True
  • False

Explanation

Question 38 of 74

1

How are the packets reassembled?

Select one of the following:

  • TCP performs reassembly

  • On the receiving end host using fragment ID

  • packets stay connected during transmission

  • application layer assembles the packets for viewing

Explanation

Question 39 of 74

1

The maximum TTL value is _________.

Select one of the following:

  • 255

  • 64

  • 1

  • no TTL exist in packets

Explanation

Question 40 of 74

1

What transmission technology is used for fragmentation of datagrams?

Select one of the following:

  • VLAN

  • MTU

  • ARP

  • MSS

Explanation

Question 41 of 74

1

Which of the types is not a unicast IPv6 unicast addresses?

Select one of the following:

  • Global-Unicast

  • Multicast

  • Link-Local Address

  • Unique Local Address

  • Loopback Address

Explanation

Question 42 of 74

1

IPv6 multicast is routable, and routers will not forward multicast packets unless there are members of the multicast groups to forward the packets to.

Select one of the following:

  • True
  • False

Explanation

Question 43 of 74

1

An anycast address is a single address assigned to a single nodes.

Select one of the following:

  • True
  • False

Explanation

Question 44 of 74

1

IPv6 address is comprised of ________ blocks of ______ bits?

Select one or more of the following:

  • 8 Blocks

  • 16 Blocks

  • 128 Bits

  • 64 Bits

Explanation

Question 45 of 74

1

What are the terms commonly referred in a "Three-way handshake"

Select one or more of the following:

  • ACK, or acknowledgment

  • SYN (synchronization) flag

  • FIN ACK, or Finish acknowledgment

  • SYN Ready

Explanation

Question 46 of 74

1

What is common maximum TCP "MTU" packet size for TCP packet?

Select one of the following:

  • The MTU for Ethernet, for instance, is 1500 bytes.

  • 1360 Bytes

  • 576 Bytes

Explanation

Question 47 of 74

1

During session connection establishment, two peers, or hosts, engage in negotiations to determine the IP segment size of packets that they will exchange during their communication.

Select one of the following:

  • MSS

  • MTU

  • ARP

  • UDP

Explanation

Question 48 of 74

1

What is an endpoint to a logical connection and the way a client program specifies a specific server program on a computer in a network?

Select one of the following:

  • Protocol Ports

  • logical Address

  • Ethernet addresses

  • VLAN

Explanation

Question 49 of 74

1

What are TCP RST Packets?

Select one of the following:

  • Reset Flags

  • TCP confirmation packets

  • TCP start packets for synchronization

  • No such packet

Explanation

Question 50 of 74

1

What are the three TCP Options?

Select one or more of the following:

  • Option-Kind

  • Option-SYN count

  • Option-Length

  • Option-Data

Explanation

Question 51 of 74

1

A web browser is an example of a ________.

Select one of the following:

  • user agent (UA)

  • server

  • host

  • user server (US)

Explanation

Question 52 of 74

1

HTTP is an application layer protocol designed within the framework of the Internet Protocol Suite.

Select one of the following:

  • True
  • False

Explanation

Question 53 of 74

1

HTTP request and response messages share similar message attributes, which are:

Select one or more of the following:

  • label maker request

  • an initial line

  • an optional message body

  • SMTP header

Explanation

Question 54 of 74

1

Define the initial line: GET /path/to/file/index.html HTTP/1.0

Select one of the following:

  • Initial Request Line

  • Initial Response Line

  • HTTP retrieval syntax

  • C+ Code

Explanation

Question 55 of 74

1

Define initial response line: HTTP/1.0 200 OK or HTTP/1.0 404 Not Found

Select one of the following:

  • Initial Request Line

  • Initial Response Line (Status Line)

  • Header Lines

  • HTTP web data packet

Explanation

Question 56 of 74

1

A message asks the server to return the response headers only, and not the actual resource (i.e. no message body).

Select one of the following:

  • POST Method

  • HEAD Method

  • Initial Response Line

  • Initial Request Line

Explanation

Question 57 of 74

1

A request is used to send data to the server to be processed in some way, like by a CGI script.; , block of data sent with the request, request URI is not a resource to retrieve, and HTTP response is normally program output, not a static file.

Select one of the following:

  • HTTP Keep-alives

  • HEAD Method

  • Initial Response Line

  • POST Method

Explanation

Question 58 of 74

1

Also called HTTP persistent connection, or HTTP connection reuse, is the idea of using a single TCP connection to send and receive multiple HTTP requests/responses, as opposed to opening a new connection for every single request/response pair.

Select one of the following:

  • HTTP Keep-alives

  • HTTP GET

  • SIP

  • DNS

Explanation

Question 59 of 74

1

Session Initiation Protocol (SIP) is a communications protocol used for communicating between different devices on a company network, whether on the LAN, the WAN, or across the Internet.

Select one of the following:

  • True
  • False

Explanation

Question 60 of 74

1

In FTP mode, the client connects from a random unprivileged port (N > 1023) to the FTP server’s command port, port 21.

Select one of the following:

  • Active

  • Passive

  • Random

  • RCP

Explanation

Question 61 of 74

1

client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an the connection, the client opens two random unprivileged ports locally (N > 1023 and N+1).

Select one of the following:

  • SMTP

  • Telnet

  • Passive FTP

  • RDP

Explanation

Question 62 of 74

1

Outlook Express connects to the SMTP server at mail.howstuffworks.com using port 53 ?

Select one of the following:

  • True
  • False

Explanation

Question 63 of 74

1

The SMTP server takes the address of the sender and the address of the recipient, as well as the body of the message. and breaks it into two parts:

Select one or more of the following:

  • recipient name

  • HTTP GET message

  • domain name

  • HTML code

Explanation

Question 64 of 74

1

SMTP Command:

introduce yourself and request extended mode

Select one of the following:

  • RCPT TO

  • HELO

  • EHLO

Explanation

Question 65 of 74

1

Fill the blank spaces to complete the text.

List the common
- introduce yourself
- introduce yourself and request extended mode
- specify the sender
- specify the recipient

Explanation

Question 66 of 74

1

Fill the blank spaces to complete the text.

- specify the body of the message (To, From and Subject should be the first three lines.)
- reset
- quit the session
- get help on commands
- verify an address

Explanation

Question 67 of 74

1

allows a site to store state information on your machine

Select one of the following:

  • name-value pairs

  • cookie

  • message

  • EHOL

Explanation

Question 68 of 74

1

In HTTP version, what response status code gives NXX redirects the client to another URL ?

Select one of the following:

  • 1XX

  • 2XX

  • 3XX

  • 4XX

  • 5XX

Explanation

Question 69 of 74

1

In HTTP version, what response status code gives NXX indicates an error on the client’s part ?

Select one of the following:

  • 1XX

  • 2XX

  • 3XX

  • 4XX

  • 5XX

Explanation

Question 70 of 74

1

In HTTP version, what response status code gives NXX indicates an error on the server’s part ?

Select one of the following:

  • 1XX

  • 2XX

  • 3XX

  • 4XX

  • 5XX

Explanation

Question 71 of 74

1

What is SIP?

Select one of the following:

  • dedicated telephone line connection

  • communications protocol used for communicating between different devices on a company network

  • an ISDN connection

Explanation

Question 72 of 74

1

For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with

Select one of the following:

  • FTP- SSL/TLS

  • SSH File Transfer Protocol (“SFTP”)

  • TKIP

  • AES

Explanation

Question 73 of 74

1

a reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it.

Select one of the following:

  • URL

  • SIP

  • Logical Port

  • directory

Explanation

Question 74 of 74

1

a standard plain text data interchange format for representing LDAP (Lightweight Directory Access Protocol) directory content and update requests.

Select one of the following:

  • HTTP

  • LDIF

  • SOAP

  • REST

Explanation