Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Data Communications and Networking

Refers to the transmission of this digital data between two or more computers and a computer network or data network that allows computers to exchange data.

information technology

forouzan

cisco

satellite data

scaling networks

troubleshooting

transmission medium

protocol

simplex communication

half- duplex communication

full-duplex communication

At which layers of the OSI model does Ethernet function? (Choose two.)

  • Physical
  • Physical
  • Data link

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?

  • Traffic Class
  • Next Header
  • Flow Label
  • Differentiated Services

What is a wiki?

  • a personal journal that is posted on the internet
  • an online meeting
  • a web page that groups of people can edit and review
  • an audio-based medium that is used to deliver information to a wide audience

What happens when two devices on the same subnet are communicating?

  • The host portion of the IP addresses will be different
  • The frame will be sent to the default gateway for delivery to the receiving device
  • The data link layer addresses are added to the IP header
  • The sending device will use ARP to determine the IP address of the receiver

Which statement is true about an interface that is configured with the IPv6 address command?

  • IPv6 traffic-forwarding is enable on the interface
  • Any IPv4 addresses that are assigned to the interface are replaced with an IPv6 address
  • A link-local IPv6 address is automatically
  • A global unicast IPv6 address is dynamically configured on the interface

Which type of IPv6 address is not routable and used for communication on a single subnet?

  • unique local address
  • loopback address
  • global unicast address
  • link-local address
  • unspecified address

What are two functions that are provided by the network layer? (Choose two.)

  • placing data on the network medium
  • carrying data between processes that are running on source and destination hosts
  • providing dedicated end-to-end connections
  • providing end devices with a unique network identifier
  • directing data packets to destination hosts on other networks

What is the purpose of the network address?

  • To provide a gate for hosts in the network
  • To allow multicast
  • To support communication to all hosts within a subnet
  • To refer to a network

The shortest compressed format of the IPv6 address 2001: 0DB8:0000:1470:0000:0000:0000:0200 is _____

  • 2001:DB8:0:1470::200

During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?

  • RAM
  • ROM
  • NVRAM
  • flash

What type of communication will send a message to all devices on a local area network?

  • allcast
  • multicast
  • broadcast
  • unicast

Which of the following are disadvantages of peer-to-peer networking? (Choose two.)

  • No centralized administration
  • No centralized administration
  • Scalability

The last host address on the 10.15.25.0/24 network is _____

  • 10.15.25.254

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

  • source port number
  • source MAC address
  • default gateway
  • DNS server

Which two statements are true of the deterministic access method?(Choose two.)

  • It is a very efficient method because there are no collisions
  • Devices take turns transmitting
  • The order of transmission is dictated by the node that asks first for the token
  • Each device has to transmit before passing the token to the next device
  • The throughput is predictable

What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?

  • Gnutella
  • SMTP
  • POP
  • Ethernet

Which command or key combination allows a user to return to the previous level in the command hierarchy?

  • exit
  • Ctrl-Z
  • end
  • Ctrl-C

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

  • IEEE
  • ISOC
  • ITU-T
  • ISO
  • IANA

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

  • DSL
  • dialup
  • satellite
  • cellular

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

  • Time-to-Live
  • Fragment Offset
  • Differentiated Services
  • Header Length

Which application use UDP as the transport layer protocol?

  • SMTP
  • DHCP
  • DNS queries
  • Telnet
  • HTTP

A new department has been established with 511 hosts that require addresses. Currently the company uses the 10.20.0.0/16 address space. How many bits must the network administrator borrow to provide addresses for this subnet without wasting addresses?

  • 5
  • 9
  • 8
  • 7
  • 6

How does the network layer use the MTU value?

  • To increase speed of delivery. The network layer ignores the MTU
  • The MTU is passed to the network layer by the data link layer
  • The network layer depends on the higher level layers to determine the MTU
  • The network layer depends on the data link layer to set the MTU, and adjusts the speed of transmission to accommodate it

A client is downloading a large file from a server using FTP. Many of the segments are lost during transit. What will most likely happen?

  • The FTP session continues, but the result is a corrupt file that must be downloaded again.
  • The FTP session is immediately terminated.
  • The FTP server responds to the client with a smaller window size in the TCP header.
  • The FTP server responds to the client with an increased window size in the TCP header.
  • The FTP client responds to the server with a smaller window size in the TCP header.
  • The FTP session continues with no alteration in window size, and the missing segment is requested again after the rest of the file is downloaded.
  • The FTP client responds to the client with an increased window size in the TCP header.

Which two engineering organizations define open standards and protocols that apply to the data link layer?

  • International Organization for Standardization (ISO)
  • International Telecommunication Union (ITU)
  • Electronic Industries Alliance (EIA
  • Internet Society (ISOC)
  • Internet Assigned Numbers Authority (IANA)

What are the primary requirements of information security? (Choose three.)

  • Availability
  • Availability
  • Scalability
  • QoS
  • Integrity
  • Confidentiality

What process is used to place one message inside another message for transfer from the source to the destination?

  • flow control
  • decoding
  • access control
  • encapsulation

Which two statements are true regarding the user EXEC mode? (Choose two.)

  • Global configuration mode can be accessed by entering the enable command
  • Interfaces and routing protocols can be configured
  • All router commands are available
  • Only some aspects of the router configuration can be viewed
  • This is the default mode on an unconfigured router when first powered up.

Which of the following are examples of proprietary protocols? (Choose two.)

  • AppleTalk
  • AppleTalk
  • Novell NetWare

Which of the following IPv4 addresses would be used in a private network?

  • 127.27.20.10
  • 169.254.72.6
  • 192.168.1.1
  • 240.23.56.12
  • 192.0.1.12

Which of these statements regarding UTP network cabling are true? (Choose two.)

  • Susceptible to EMI and RFI
  • Susceptible to EMI and RFI
  • Most difficult type of networking cable to install
  • Uses light to transmit data
  • Most commonly used type of networking cable

A network administer has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly?

  • Type the command and then press the Tab key
  • Type help and press the Enter key at the prompt
  • Type the command and then press CTRL-C
  • Type the command, type help, and press the Enter key.
  • Type the command and then press the? key

The farther you are from the central office when utilizing a DSL connection, the ______ the connection speed

  • slower

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

  • (config)# enable password secret
  • (config) # enable secret Encrypted_Password
  • (config) # service password-encryption
  • (config) # enable secret Secret_Password
  • (config-line) # password secret

What type of IPv6 address should be used for communication that is limited to a single network segment?

  • Unique local
  • Unspecified
  • Global unicast
  • Link-local

To save time, IOS commands may be partially entered and then completed by typing which key or key combination?

  • Ctrl-P
  • Tab
  • Up Arrow
  • Ctrl-N
  • Right Arrow
  • Down Arrow

What happens to frames that are too long or too short for the channel used?

  • They clog the network and block the delivery of other frames.
  • They are returned to the sender.
  • They are broken up into smaller pieces.
  • They are dropped.
  • They are delivered but much slower than proper-size frames.

Which type of traffic must receive the highest priority from QoS?

  • Order processing
  • VoIP
  • Web traffic
  • Email

Which of the following are business-class Internet connection technologies normally supplied by a service provider? (Choose two.)

  • Broadband cable
  • Mobile services
  • Leased lines
  • Cellular
  • Metro Ethernet

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

  • flow control
  • response timeout
  • access method
  • encapsulation

Which address is used as a destination address on a broadcast Ethernet frame?

  • 0C-FA-94-24-EF-00
  • FF-FF-FF-FF-FF-FF
  • 255.255.255.255
  • 0.0.0.0

What are the purpose and functions of the physical layer in data networks? (Choose two.)

  • Controls how the data is transmitted onto the physical media
  • Controls how the data is transmitted onto the physical media
  • Encodes the data into signals

A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?

  • setup mode
  • privileged EXEC mode
  • user EXEC mode
  • global configuration mode

Which TCP/IP model layer is responsible for providing the best path through the network?

  • Application
  • Network Access
  • Transport
  • Internet

Which term defines the processing capabilities of a switch by rating how much data can be processed per second?

  • forwarding rate
  • switching rate
  • form factor
  • port density

On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the _____ MAC address.

  • broadcast

What is the name given to a one-to-many message delivery option?

  • Unicast
  • Multicast
  • Broadcast
  • Manycast

Which two files are loaded into RAM by the router when it boots? (Choose two.)

  • POST
  • running configuration
  • bootsrap program
  • IOS image
  • startup configuration

Where is the configuration used during startup on Cisco IOS devices located?

  • Terminal emulator
  • NVRAM
  • Startup config
  • Running config

Which statement describes a feature of an IOS host name configuration?

  • It must be registered with a DNS server
  • It does not allow spaces
  • It cannot start with a number
  • Its maximum length is 255 characters.

What is the Cisco IOS?

  • The configuration for the Cisco network device
  • The operating system for the Cisco network device
  • The memory for the Cisco network device
  • The CPU for the Cisco network device

What is a fault-tolerant network?

  • A network that can provide priority treatment of voice and video traffic
  • A network that offers secure transactions
  • A network that is incapable of failing
  • A network that can reroute traffic in case of device failure

A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?

  • link-local
  • loopback
  • experimental
  • private

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer

  • DoS attack
  • zero – day attack
  • spyware
  • identity theft

Which two statements describe intermediary devices? (Choose two.)

  • Intermediary devices connect individual hosts to the network.
  • Intermediary devices connect individual hosts to the network.
  • Intermediary devices initiate the encapsulation process.
  • Intermediary devices direct the path of the data.

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

  • It sends the frame to all ports that are registered to forward broadcasts.
  • It sends the frame to all ports.
  • It drops the frame.
  • It sends the frame to all ports except the port on which it received the frame.

Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)

  • DSL
  • DSL
  • cable

The Ethernet _____ sublayer is responsible for communicating directly with the physical layer.

  • MAC

What is the purpose of using a source port number in a TCP communication?

  • to assemble the segments that arrived out of order
  • to notify the remote device that the conversation is over
  • to inquire for a non received segment
  • to keep track of multiple conversations between devices

Which devices would be considered end devices on a network? (Choose four.)

  • Server
  • Server
  • IP phone
  • Printer
  • Wireless access point
  • Tablet computer

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

  • The end-user device needs mobility when connecting to the network.
  • The end-user device only has an Ethernet NIC.
  • The end-user device area has a high concentration of RFI.
  • The end-user device requires a dedicated connection because of performance requirements.

Which organization is responsible for developing communications standards for Voice over IP (VoIP) devices?

  • The Internet Corporation for Assigned Names and Numbers (ICANN)
  • The International Telecommunications Union-Telecommunications Standardization Sector (ITU-T)
  • The Telecommunications Industry Association (TIA)
  • The Electronics Industry Alliance (EIA)

What type of protocol describes communication over a data link and the physical transmission of data on the network media?

  • Network access protocol
  • Application protocol
  • Transport protocol
  • Internet protocol

What type of delivery uses data link layer addresses?

  • remote delivery
  • remote delivery using routers
  • local delivery
  • local and remote delivery

Which technology would be best to provide a home user with a highspeed, always-on Internet connection?

  • Satellite
  • Dial-up
  • DSL
  • Cellular

Which statement accurately describes public IP addresses?

  • Public IP addresses must be unique across the entire Internet
  • Public IP addresses are only required to be unique within the local network
  • Network administrators are free to select any public addresses to use for network devices that access the Internet
  • Public addresses can be duplicated only within a local network
  • Public addresses cannot be used within a private network

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

  • wireless LAN
  • wired LAN
  • extranet
  • wireless WAN
  • intranet

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

  • SSH
  • Console
  • AUX
  • Telnet

Within a production network, what is the purpose of configuring a switch with a default gateway address?

  • It provides a next-hop address for all traffic that flows through the switch
  • The default gateway address is used to forward packets originating from the switch to remote networks.
  • Hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination
  • A switch mush have a default gateway to be accessible by Telnet and SSH

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

  • less cost to implement
  • lacks centralized administration
  • scalable
  • better device performance when acting as both client and server
  • easy to create

Which field in an Ethernet frame is used for error detection?

  • Preamble
  • Frame Check Sequence
  • Type
  • Destination MAC Address

A ______ address is defined as a reserved address that routes packets back to the host

  • loop-back

What are two functions of end devices on a network? (Choose two.)

  • They originate the data that flows through the network.
  • They originate the data that flows through the network.
  • They direct data over alternate paths in the event of link failures.
  • They are the interface between humans and the communication network.

What happens if part of an FTP message is not delivered to the destination?

  • The entire FTP message is re-sent
  • The FTP source host sends a query to the destination host
  • The part of the FTP message that was lost is re-sent
  • The message is lost because FTP does not use a reliable delivery method

Which message delivery option is used when all devices need to receive the same message simultaneously?

  • unicast
  • broadcast
  • duplex
  • multicast

In which scenario would the use of a WISP be recommended?

  • any home with multiple wireless devices
  • an apartment in a building with cable access to the Internet
  • a farm in a rural area without wired broadband access
  • an Internet cafe in a city

The 8-bit binary value for 41 is _____

  • 00101001

When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the CLI, what will be returned in the CLI?

  • EaSt-2+56(config)#
  • EaSt-58(config)#
  • Switch(config)#
  • % Invalid input detected
  • Switch EaSt-2+56(config)#

Which two factors influence the method that is used for media access control? (Choose two.)

  • how nodes share the media
  • how nodes share the media
  • how data is generated by end devices applications
  • how the IP protocol forwards the packet to the destination
  • how signals are encoded by the NICs on end devices
  • how connection between nodes appears to the data link layer

What happens when a data collision occurs on an Ethernet bus?

  • The device with the lower MAC address stops transmitting to give the device with the higher MAC address priority.
  • The MAC sublayer prioritizes the frame with the lower MAC address.
  • All devices stop transmitting and try again later.
  • The CRC value is used to repair the data frames.

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

  • zero – day attack
  • spyware
  • identity theft
  • DoS attack

What are the primary purposes of the transport layer? (Choose three.)

  • Adding the source and destination IP address
  • Adding the source and destination MAC address to frames
  • Determining the best route between source and destination
  • Tracking the individual communication between applications on the source and destination hosts
  • Identifying the proper application for each communication stream
  • Segmenting data for and reassembling segmented data into streams of application data at the destination

What is a characteristic of UDP?

  • Flow control
  • Reliable delivery
  • Connectionless
  • Expectational acknowledgements
  • Windowing

Which organization is responsible for the standard that defines Media Access Control for wired Ethernet?

  • IAB
  • IEEE
  • ISO
  • ISOC
  • IETF

Which device performs the function of determining the path that messages should take through internet works?

  • a DSL modem
  • a firewall
  • a router
  • a web server

What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer? (Choose three.)

  • Frame placement on the media
  • Addressing
  • Media recovery
  • Error detection
  • Frame delimiting

Which message timing factor impacts how much information can be sent and the speed at which it can be delivered?

  • Access method
  • Delay speed
  • Flow control
  • Response timeout

Which is a function of the Logical Link Control (LLC) sublayer?

  • to identify which network layer protocol is being used
  • to provide data link layer addressing
  • to define the media access processes that are performed by the hardware
  • to accept segments and package them into data units that are called packets

What command will display a list of keywords available for viewing the status of an IOS switch?

  • Switch# status?
  • Switch# sh?
  • Switch# help
  • Switch# show?

Which logical address is used for delivery of data to a remote network?

  • destination IP address
  • destination MAC address
  • destination port number
  • source MAC address
  • source IP address

What is encrypted with the enable secret command?

  • the VTY line password
  • the consoled line password
  • all configured passwords
  • the privileged executive mode password

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation?

  • virtualization
  • BYOD
  • online collaboration
  • maintaining communication integrity

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

  • Ethernet, IP, TCP, HTTP
  • HTTP, IP, TCP, Ethernet
  • HTTP, TCP, IP, Ethernet
  • Ethernet, TCP, IP, HTTP

During troubleshooting procedures, from which location will most Cisco routers load a limited IOS

  • RAM
  • NVRAM
  • flash
  • ROM

Which address is a multicast MAC address?

  • 01-00-5E-00-00-C8
  • FF-FF-FF-01-00-5E
  • 0-07-E9-00-00-D4
  • FF-FF-FF-FF-FF-FF

Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks?

  • 80
  • 8
  • 16
  • 128

What is the command netstat –r used for?

  • to release the assigned IP address
  • to display the TCP sockets
  • to renew the default gateway
  • to display the host routing table

In which scenario would the use of a WISP be recommended

  • a farm in rural area without wired broadband access
  • any home with multiple wireless devices
  • an Internet cafe in a city
  • an apartment in a building with cable access to the Internet

What is an advantage that UDP has over TCP?

  • Reliable delivery
  • Reordering of segments
  • Advanced flow control
  • Low overhead

For which three reasons was a packet switched connectionless data communications technology used when developing the Internet (Choose three.)

  • it can rapidly adapt to the failure of network devices and communication links
  • it can rapidly adapt to the failure of network devices and communication links
  • Data packets can travel through the network using multiple different paths
  • It requires that a data circuit between the source and destination be established before data can be transferred.
  • it allows for billing of network use by the amount of time a connection is established
  • Network devices dynamically decide on the best available path to forward each packet.

Which statement correctly describes frame encoding?

  • It generates the electrical, optical, or wireless signals that represent the binary numbers of the frame.
  • It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
  • It transmits data signals along with a clock signal which occurs at evenly spaced time durations.
  • It uses the characteristic of one wave to modify another wave.

When is a wired connection preffered to a wireless connection by an end-user device?

  • when the end-user device only has a WLAN NIC
  • when the end-user device will run an application that is delay tolerant
  • when the end-user device will run an application that requires a dedicated connection to the network
  • when the end-user device is within range of a wireless signal

What is the transport layer PDU?

  • Packet
  • Bit
  • Segment
  • Frame
  • Data

When a client connects to an HTTP server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response?

  • the original source port number that was randomly generated by the client
  • the original destination port number that was generated by the client
  • a randomly generated destination port number
  • a destination port number of 80, referencing the service requested

Which entities are involve in a temporary communication that is established by the transport layer?

  • LANs
  • a host an intermediary device
  • network media
  • applications
  • servers

Why is DHCP preferred for use on large networks?

  • Large networks send more requests for domain to IP address resolution than do smaller networks.
  • It prevents sharing of files that are copyrighted.
  • It is a more efficient way to manage IP addresses than static address assignment.
  • Hosts on large networks require more IP addressing configuration settings than hosts on small networks.
  • DHCP uses a reliable transport layer protocol.

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

  • convergence
  • synchronization
  • congestion
  • optimization

Which two message timing mechanisms are used in data communication? (Choose two.)

  • encoding
  • encapsulation
  • flow control
  • formatting
  • response timeout

The TCP/IP application layer effectively consists of which three OSI layers?

  • Application, transport, network
  • Application, session, transport
  • Application, network, data link
  • Application, presentation, session

What is and advantage of using standards to develop and implement protocols?

  • A particular protocol can be implemented by one manufacturer
  • Different manufacturers are free to apply different requirements when implementing a protocol
  • Standards provide flexibility for manufacturers to create devices that comply with unique requirements
  • Products from different manufacturers can interoperate successfully

Which three fields are used in a UDP segment header? (Choose three.)

  • Length
  • Length
  • Source Port
  • Checksum

What two criteria are used to help select a network medium from various network media? (Choose two.)

  • the cost of the end devices utilized in the network
  • the types of data that need to be prioritized
  • the environment where the selected medium is to be installed
  • the number of intermediary devices installed in the network
  • the distance the selected medium can successfully carry a signal

Which statement is correct about network protocols?

  • Network protocols define the type of hardware that is used and how it is mounted in racks
  • They define how messages are exchanged between the sources and the destination
  • They are only required for exchange of message between devices on remote network
  • They all function in the network access layer of TCP/IP

Which entities are involved in a temporary communication that is established by the transport layer?

  • servers
  • applications
  • LANs
  • network media
  • a host an intermediary device

What is a group of web pages that groups of individuals can edit and view together called?

  • Access point
  • Podcasting
  • Weblog (blog)
  • TelePresence endpoint
  • Instant messaging
  • Wiki

What is a characteristic of a contention-based access method?

  • It processes more overhead than the controlled access methods do
  • It has has mechanisms to the turns devices take to access the media
  • It scales very well under heavy media use
  • It is as nondeterministic method

Which number or set of numbers represents a socket?

  • 10.1.1.15
  • 21
  • 192.168.1.1:80
  • 01-23-45-67-89-AB

What organization is responsible for the overall management and development of Internet standards?

  • IRTF
  • IAB
  • IETF
  • IEEE
  • ISO

Which two statement describe broadcast transmissions on a wired network? (Choose two.)

  • Limited broadcasts are forwarded by routers
  • Limited broadcasts are only intended for the hosts on a local network
  • Directed broadcast use the IP address of 255.255.255.255

What is an advantage of using standards to develop and implement protocols?

  • Different manufacturers are free to apply different requirements when implementing a protocol
  • Products from different manufacturers can interoperate successfully
  • A particular protocol can only be implemented by one manufacturer
  • Standard provide flexibility for manufacturers to create devices that comply with unique requirements

What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)

  • message size
  • message size
  • connector specifications
  • delivery options
  • end-device installation
  • data encoding

What is the purpose of protocols in data communications?

  • specifying the device operating systems that will support the communication
  • determining the electronic specifications to enable the communication
  • providing the rules required for a specific type of communication to occur
  • specifying the bandwidth of the channel or medium for each type of communication

Which statement describes a network that supports QoS?

  • The network should be able to expand to keep up with user demand
  • Data sent over the network is not altered in transmission
  • The fewest possible devices are affected by a failure
  • The network provides predictable levels of service to different types of traffic

What does UDP do when receiving messages that are more than one datagram in length?

  • UDP places the datagrams into the correct order before passing them to the application.
  • UDP requests retransmission of the datagrams in the correct order before passing to the application.
  • UDP transmissions are limited to a single datagram.
  • UDP reassembles that data in the order it was received and passes it to the application.

The farther you are from the central office when utilizing a DSL connection, the _____ the connection speed

  • slower

What is the purpose of the physical link control field in a data link layer header?

  • to establish the media link
  • to establish a logical connection between nodes
  • to indicate congestion in the media
  • to start and stop traffic over the media

A _____ network is able to expand to accept new devices and applications without affecting performance.

  • scalable

What are two benefits of collaboration and video-on-demand applications? (Choose two.)

  • providing better social media opportunities
  • providing better social media opportunities
  • providing faster, more secure business communications
  • ensuring a more reliable network
  • providing a richer e-learning environment

Which OSI reference model layer is responsible for common representation of the data transferred between application layer services?

  • Physical
  • Presentation
  • Application
  • Session
  • Transport
  • Data link
  • Network

What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3?

  • 64 bytes – 1522 bytes
  • 32 bytes – 1522 bytes
  • 64 bytes – 1518 bytes
  • 32 bytes – 1518 bytes

In fiber optic meda, the signals are represented as patterns of _____

  • light

Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC?

  • IEEE 802.2
  • EEE 802.15
  • IEEE 802.11
  • IEEE 802.6
  • IEEE 802.3

Which statement describes a characteristic of the frame header fields of the data link layer?

  • They all include the flow control and logical connection fields
  • They vary depending on protocols
  • Ethernet frame header fields contain Layer 3 source and destination addresses
  • They include information on user applications

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

  • Telnet access
  • SVI
  • physical switchport access
  • password encryption

What type of address is 01-00-5E-0A-00-02?

  • an address that reaches every host in the network
  • an address that reaches one specific host
  • an address that reaches a specific group of hosts
  • an address that reaches every host inside a local subnet

Why would a network administrator use the CLI of the Cisco IOS?

  • to provide automatic (unmanned) management of Cisco network devices
  • to test the performance on a particular LAN
  • to add a password to a Cisco network device
  • to monitor the number of times a device has been powered on and of

Which two components are added to the PDU at the network access layer? (Choose two.)

  • frame header
  • frame header
  • HTTP header
  • Trailer

An _____ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.

  • Intranet

What is an advantage of UDP over TCP?

  • UDP acknowledges received data
  • UDP communication requires less overhead
  • UDP reorders segments that are received out of order
  • UDP communication is more reliable

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

  • Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
  • Copy the running configuration to the startup configuration file.
  • Reload the device and type yes when prompted to save the configuration
  • Copy the information in the startup configuration file to the running configuration

What range of ports can either be used by TCP or UDP to identify the requested service on the destination device or as a client source port?

  • 0 to 1023
  • 0 to 49151
  • 1024 to 49151
  • 49152 to 65535

Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to the interface?

  • no switchport
  • ip classless
  • switchport
  • noshutdown

An ______ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.

  • Intranet

What are the parts of an IPv4 address? (Choose two.)

  • Broadcast
  • Subnet mask
  • Network

Which device acts as gateway to allow hosts to send traffic to remote IP networks?

  • local router
  • local switch
  • DNS server
  • DHCP server

What is a converged network?

  • A network where voice, video, and data move over the same infrastructure
  • A network that makes use of both wired and wireless technology
  • A network that makes use of both fiber-optic and copper connections

Which type of network design combines voice, video, and data on the same communication channel?

  • an extranet
  • a converged network
  • a traditional network
  • a storage area network

Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model? (Choose two.)

  • TCP
  • TCP
  • DNS
  • UDP

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

  • Use the AUX port to locally access the switch from a serial or USB interface of the PC
  • Use Secure Shell to remotely access the switch through the network.
  • Use the console port to locally access the switch from a serial or USB interface of the PC.
  • Use Telnet to remotely access the switch through the network.

An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain

  • latency
  • digital bandwidth
  • goodput
  • throughput

How is the Cisco IOS generally accessed and navigated?

  • With a Cisco-proprietary application
  • By the use of a custom GUI
  • Through the CLI using a terminal emulator
  • Using a web browser

Which of the following OSI model layers have the same functionality as the network access layer in the TCP/IP model? (Choose two.)

  • Transport
  • Data link
  • Presentation
  • Network
  • Session
  • Physical

A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?

  • To notify the workstation, that another router on the same network, is the better default-gateway to reach the remote server
  • The default gateway is overwhelmed by network traffic and the request is redirected to another router
  • The default gateway does not know a route to the destination
  • The network topology has changed and a new route toward the file server is available

What type of information would be found on a logical topology diagram?

  • Location of departmental printer
  • Length and type of all cable runs
  • Location of departmental switch
  • IP addressing scheme

In fiber optic meda, the signals are represented as patterns of _____

  • light

Which destination address is used in an ARP request frame?

  • the physical address of the destination host
  • FFFF.FFFF.FFFF
  • 0.0.0.0
  • 255.255.255.255
  • AAAA.AAAA.AAAA

What is a characteristic of a WAN hub-and-spoke topology?

  • All sites require a hub device that connects to a router
  • it requires that every site be interconnected to each other through point to-point links
  • The branch sites are connected to a central site through point-point links
  • It requires that some of the branch sites be interconnected through point-to-point links

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

  • limited susceptibility to EMI/RFI
  • limited susceptibility to EMI/RFI
  • greater distances per cable run
  • lower installation cost
  • greater bandwidth potential

What are the contents of the data field in a frame?

  • The length of the frame
  • The Layer 2 source address
  • The network layer PDU
  • A CRC

Which of the following elements do both human and computer communication systems have in common? (Choose three.)

  • Default gateway
  • Source
  • Receiver
  • Keyboard
  • Channel

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

  • gateway of last resort
  • next-hop
  • route source
  • outgoing interface

What is the primary defense against unauthorized remote access to network devices?

  • Configuring a VTY password
  • Configuring a default gateway
  • Configuring an IP address
  • Configuring a console password

Which application layer protocol allows users on one network to reliably transfer files to and from a host on another network?

  • TFTP
  • FTP
  • DHCP
  • IMAP
  • HTTP

What is initially entered at the CLI of the Cisco IOS when typing a command sequence?

  • Keyword
  • A space
  • Argument
  • Command

What is true about the Ethernet MAC address? (Choose three.)

  • The first 6 hexadecimal digits of a MAC address represent the OUI.
  • The first 6 hexadecimal digits of a MAC address represent the OUI.
  • A MAC address is 32 bits in length.
  • The IEEE is responsible for assigning vendors a unique 6-byte code.
  • The vendor is responsible for assigning the last 24 bits of the MAC address.
  • The MAC address is also known as a burned-in address.

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

  • packet
  • bits
  • frame
  • segment

What is assigned by the transport layer to identify an application or service?

  • Port
  • Segment
  • IP address
  • MAC address
  • Packet

What is the name given to the Ethernet MAC sublayer PDU?

  • Bit
  • Segment
  • Frame
  • Packet

What type of connection to a Cisco IOS switch is used to make the initial configuration?

  • SSH
  • Web interface
  • Console port
  • AUX port
  • Telnet

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this command?

  • to request the router to forward the connection request
  • to test if the workstation can communicate on the network
  • to obtain dynamic IP address from the server
  • to resolve the domain name of the file server to its IP address

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

  • The client sends an ISN to the server to start the 3-way handshake
  • The client sets the window size for the session
  • The client randomly selects a source port number
  • The client sends a synchronization segment to begin the session

Which TCP header field specifies the number of bytes that can be accepted before an acknowledgement is required?

  • Checksum
  • Window size
  • Header length
  • Acknowledgement number

A network administrator has borrowed 3 bits from the 10.20.0.0/25 network to create subnets. The administrator then decided to use the first subnet for point-to-point serial WAN connections each requiring two addresses. How many WAN connections can the administrator address using only the first subnet if he is using VLSM?

  • 1
  • 16
  • 32
  • 64
  • 2
  • 128
  • 4

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

  • it adds control information to network protocol layer data
  • it performs the function of NIC driver software
  • it adds a header and trailer to form an OSI Layer 2 PDU
  • It is responsible for Media Access Control

Why would a technician enter the command copy startup-config running config?

  • to save an active configuration to NVRAM
  • to remove all configuration from the switch
  • to make a changed configuration the new startup configuration
  • to copy an existing configuration into RAM

What is the primary purpose of ARP?

  • translate URLs to IP addresses
  • provide dynamic IP configuration to network devices
  • resolve IPv4 addresses to MAC addresses
  • convert internal private addresses to external public addresses

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

  • an extranet
  • an intranet
  • a local area network
  • the Internet

What will a network administrator use to modify a configuration on a Cisco router?

  • Windows Explorer
  • IOS
  • the Windows command prompt
  • a DHCP server
  • a control panel

What name is given to a group of interrelated protocols necessary to perform a communication function?

  • Functional protocol
  • Functional collection
  • Protocol stack
  • Protocol suite

What is a network infrastructure that provides access to other networks over a wide geographic area?

  • WLAN
  • SAN
  • LAN
  • WAN
  • MAN

A _____ address is defined as a reserved address that routes packets back to the host

  • loop-back

What three protocols do email users and servers use to process email? (Choose three.)

  • DNS
  • IMAP4
  • DHCP
  • SMTP
  • POP3

What is the function of the kernel of an operating software?

  • The kernel provisions hardware resources to meet software requirements.
  • It is an application that allows the initial configuration of a Cisco device.
  • The kernel links the hardware drivers with the underlying electronics of a computer.
  • It provides a user interface that allows users to request a specific task.

A collision fragment, also known as a _____ frame, is a frame of fewer than 64 bytes in length.

  • runt
Comments
Buy Me Coffee

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Object Oriented Programming Laboratory

Mobile Programming

Network Security

Mobile Application Design and Development

Managing Information and Technology

Management Information Systems

Mobile Application Design and Development 2

Mail and Web Services

Living in the Information Technology Era

Information Technology Capstone Project

Information Technology Practicum

Intro to Hardware Description Language

Introduction to Computing

Introduction to Human Computer

Introduction to Information Systems

Introduction to Multimedia

Internet Marketing and Entrepreneurship

Integrative Programming and Technology 2

Internet Technology in Real Estate

Information Assurance and Security 2

Information Assurance and Security 3

Information Security and Management

Information Systems Operations and Maintenance

Fundamentals of Investigation and Intelligence

Fundamentals of Database System

Digital Imaging

Data Structures and Algorithms

Data Communications and Networking 2

Cyber Security: Theories and Practice

Database Management System

Computer Fundamentals

Chemistry for Engineers

Animation Project

Load Testing

3D Game Art Development

Auditing and Assurance Concepts and Applications

System Administration and Maintenance

Linux Administration

Integrative Programming and Technology

Data Communications and Networking 4

Current Trends and Issues

Applied Business Tools and Technologies

Software Engineering

Computer Programming

Systems Integration and Architecture

Application Lifecycle Management

Data Communications and Networking 3

Information Assurance and Security

Principles of Operating System and its Application

Driver Device

Air Conditioning and Refrigeration Service

Refrigeration Service

Network Administration

Maintenance Technology

Industrial Electronics Maintenance

Electronics Engineering Technology

Computer Support Technician


Show All Subject
Affiliate Links

Shopee Cashback Voucher

Temu $0 Shipping Fee

Amazon 75% Off Discounts