Lorem ipsum dolor sit amet, conscur adisng elit, sed do eiusmod tempor iniunt ut labore et dolore mana aliqua. Ut enim ad minim veniam, quis nostrud exetation ullco laboris nisi ut aliquip ex ea commodo coequat. Duis aute irure dolor
Lorem ipsum dolor sit amet, conscur adisng elit, sed do eiusmod tempor iniunt ut labore et dolore mana aliqua. Ut enim ad minim veniam, quis nostrud exetation ullco laboris nisi ut aliquip ex ea commodo coequat. Duis aute irure dolor
Lorem ipsum dolor sit amet, conscur adisng elit, sed do eiusmod tempor iniunt ut labore et dolore mana aliqua. Ut enim ad minim veniam, quis nostrud exetation ullco laboris nisi ut aliquip ex ea commodo coequat. Duis aute irure dolor
Lorem ipsum dolor sit amet, conscur adisng elit, sed do eiusmod tempor iniunt ut labore et dolore mana aliqua. Ut enim ad minim veniam, quis nostrud exetation ullco laboris nisi ut aliquip ex ea commodo coequat. Duis aute irure dolor
1. Why are two strands of fiber used for a single fiber optic
connection?
They
allow for full-duplex connectivity.
The
two strands allow the data to travel for longer distances without degrading.
They
prevent crosstalk from causing interference on the connection.
They
increase the speed at which the data can travel.\
2. What is indicated by the term throughput?
the
measure of the usable data transferred across the media
the
capacity of a particular medium to carry data
the
measure of the bits transferred across the media over a given period of time
the
guaranteed data transfer rate offered by an ISP
the
time it takes for a message to get from sender to receiver
3. What are two examples of hybrid topologies?
(Choose two.)
partial
mesh
full
mesh
hub
and spoke
extended
star
point-to-point
4. What is a role of the Logical Link Control
sublayer?
to
provide access to various Layer 1 network technologies
to
mark frames to identify the network layer protocol being carried
to
provide data link layer addressing
to
define the media access processes performed by network hardware
5.
PC on the left connects to a switch. This connection is labeled
1. The switch connects to a router. This connection is labeled 2. The router
connects to another router. This link is labeled 3.
Refer to the exhibit. The PC is connected to the console port of
the switch. All the other connections are made through FastEthernet links.
Which types of UTP cables can be used to connect the devices?
1
- crossover, 2 - straight-through, 3 - rollover
1
- crossover, 2 - rollover, 3 - straight-through
1
- rollover, 2 - straight-through, 3 - crossover
1
- rollover, 2 - crossover, 3 - straight-through
6. Which statement describes an extended star topology?
Each
end system is connected to its respective neighbor via an intermediate device.
End
devices are connected together by a bus and each bus connects to a central
intermediate device.
End
devices connect to a central intermediate device, which in turn connects to
other central intermediate devices.
All
end and intermediate devices are connected in a chain to each other.
7. What is one advantage of using fiber optic cabling rather than
copper cabling?
It
is able to be installed around sharp bends.
It
is usually cheaper than copper cabling.
It
is easier to terminate and install than copper cabling.
It
is able to carry signals much farther than copper cabling.
8. Which type of connector does a network interface card use?
DIN
RJ-45
RJ-11
PS-2
9. What is the function of the CRC value that is found in the FCS
field of a frame?
to
verify the physical address in the frame
to
verify the integrity of the received frame
to
verify the logical address in the frame
to
compute the checksum header for the data field in the frame
10. Which layer of the OSI model is responsible for specifying the
encapsulation method used for specific types of media?
physical
transport
application
data
link
11. As data travels on the media in a stream of 1s and 0s how does a
receiving node identify the beginning and end of a frame?
The
transmitting node inserts start and stop bits into the frame.
The
receiving node identifies the beginning of a frame by seeing a physical
address.
The
transmitting node sends a beacon to notify that a data frame is attached.
The
transmitting node sends an out-of-band signal to the receiver about the
beginning of the frame.
12. What is true concerning physical and logical topologies?
Physical
topologies display the IP addressing scheme of each network.
Physical
topologies are concerned with how a network transfers frames.
Logical
topologies refer to how a network transfers data between devices.
The
logical topology is always the same as the physical topology.
13. Option 1: laser as
light source. Press spacebar to enter matching mode.
Match the characteristics to the correct type of fiber. (Not all
options are used.)
supports full-duplex operation
Multimode Fiber
LED as light source
several paths of light into the fiber
generally used for campus backbone
Single-mode Fiber
only one ray of light into the fiber
generally used with LANs
laser as light source
14.
The graphic displays a terminated RJ45 connector. The untwisted
wires at the end of the PVC sheath are crimped by the connector.
Refer to the exhibit. What is wrong with the displayed
termination?
The
woven copper braid should not have been removed.
The
wrong type of connector is being used.
The
wires are too thick for the connector that is used.
The
untwisted length of each wire is too long.
15. What are two reasons for physical layer protocols to use frame
encoding techniques? (Choose two.)
to
distinguish data from control information
to
provide better media error correction
to
identify where the frame starts and ends
to
increase the media throughput
to
reduce the number of collisions on the media
16. What is the definition of bandwidth?
the
measure of the transfer of bits across the media over a given period of time
the
speed at which bits travel on the network
the
amount of data that can flow from one place to another in a given amount of
time
the
measure of usable data transferred over a given period of time
17. What is contained in the trailer of a data-link frame?
data
logical
address
physical
address
error
detection
18. What are two services performed by the data link layer of the
OSI model? (Choose two.)
It
accepts Layer 3 packets and encapsulates them into frames.
It
monitors the Layer 2 communication by building a MAC address table.
It
provides media access control and performs error detection.
It
encrypts data packets.
It
determines the path to forward packets.
19. A network administrator notices that some newly installed
Ethernet cabling is carrying corrupt and distorted data signals. The new
cabling was installed in the ceiling close to fluorescent lights and electrical
equipment. Which two factors may interfere with the copper cabling and result
in signal distortion and data corruption? (Choose two.)
crosstalk
signal
attenuation
extended
length of cabling
EMI
RFI
20. Which method of data transfer allows information to be sent and
received at the same time?
simplex
half
duplex
full
duplex
multiplex
21. Which characteristic describes crosstalk?
the
loss of wireless signal over excessive distance from the access point
the
distortion of the network signal from fluorescent lighting
the
distortion of the transmitted messages from signals carried in adjacent wires
the
weakening of the network signal over long cable lengths
22. A network administrator is designing the layout of a new
wireless network. Which three areas of concern should be accounted for when
building a wireless network? (Choose three.)
packet
collision
mobility
options
interference
security
extensive
cabling
coverage
area
23. What technique is used with UTP cable to help protect against
signal interference from crosstalk?
twisting
the wires together into pairs
encasing
the cables within a flexible plastic sheath
terminating
the cable with special grounded connectors
1. Option 3: This
organization promotes the open development, evolution, and use of the Internet
throughout the world.. Press spacebar to enter matching mode.
Match the description to the organization. (Not all options are
used.)
ISOC
This organization promotes the open development, evolution, and
use of the Internet throughout the world.
ISO
This organization is the largest developer of international
standards in the world for a wide variety of products and services. It is known
for its Open Systems Interconnection (OSI) reference model.
EIA
IANA
This organization is responsible
for overseeing and managing IP address allocation, domain name management, and
protocol identifiers.
2. What three application layer protocols are part of the TCP/IP
protocol suite? (Choose three.)
ARP
NAT
PPP
DHCP
DNS
FTP
3. Which statement is true about the TCP/IP and OSI models?
The
OSI Layer 7 and the TCP/IP application layer provide identical functions.
The
TCP/IP network access layer has similar functions to the OSI network
layer.
The
TCP/IP transport layer and OSI Layer 4 provide similar services and
functions.
The
first three OSI layers describe general services that are also provided
by the TCP/IP internet layer.
4. What process is used to place one message inside another message
for transfer from the source to the destination?
access
control
flow
control
decoding
encapsulation
5. At which layer of the OSI model would a
logical address be added during encapsulation?
transport
layer
data
link layer
physical
layer
network
layer
Bottom of FormTop of Form
6 .
Option 3: message
encapsulation. Press spacebar to enter matching mode.
Match each description to its corresponding term. (Not all
options are used.)
the process of determining when to begin
sending messages on a network
the process of converting information from one
format into another acceptable for transmission
message encoding
the process of placing one message format
inside another message format
message sizing
the process of unpacking one message format
from another message format
the process of breaking up a long message into
individual pieces before being sent over the network
message encapsulation
Bottom of Form
7. What is an advantage of network devices using open standard protocols?
Network
communications is confined to data transfers between devices from the same
vendor.
Competition
and innovation are limited to specific types of products.
A
client host and a server running different operating systems can successfully
exchange data.
Internet
access can be controlled by a single ISP in each market.
8. Which characteristic describes the default gateway of a host
computer?
the
physical address of the switch interface connected to the host computer
the
physical address of the router interface on the same network as the host
computer
the
logical address of the router interface on the same network as the host
computer
the
logical address assigned to the switch interface connected to the router
9. What are proprietary protocols?
protocols
that can be freely used by any organization or vendor
protocols
developed by organizations who have control over their definition and operation
protocols
developed by private organizations to operate on any vendor hardware
a
collection of protocols known as the TCP/IP protocol suite
10. Which statement is correct about network protocols?
They
define how messages are exchanged between the source and the destination.
They
all function in the network access layer of TCP/IP.
They
are only required for exchange of messages between devices on remote networks.
Network
protocols define the type of hardware that is used and how it is mounted in
racks.
11. What method can be used by two computers to ensure that
packets are not dropped because too much data is being sent too quickly?
flow
control
access
method
encapsulation
response
timeout
12. What will happen if the default gateway address is incorrectly
configured on a host?
The
host cannot communicate with other hosts in the local network.
The
switch will not forward packets initiated by the host.
The
host will have to use ARP to determine the correct address of the default
gateway.
The
host cannot communicate with hosts in other networks.
A
ping from the host to 127.0.0.1 would not be successful.
13. What is an advantage of using standards to develop and implement
protocols?
A
particular protocol can only be implemented by one manufacturer.
Products
from different manufacturers can interoperate successfully.
Standards
provide flexibility for manufacturers to create devices that comply with unique
requirements.
Different
manufacturers are free to apply different requirements when implementing a
protocol.
14. Which PDU format is used when bits are received from the network
medium by the NIC of a host?
segment
frame
file
packet
15. What type of communication will send a message to all devices on
a local area network?
multicast
allcast
unicast
broadcast
16. Which three layers of the OSI model are comparable in function
to the application layer of the TCP/IP model? (Choose three.)
application
transport
session
physical
network
presentation
data
link
17.
Host1 connects to Switch1 and then to Router1. Router1 connects
to Router2 via a serial link. Router2 connects to Switch2 and Switch2 connects
to a server. Router2 also connects to an ISP via a serial link.
Refer to the exhibit. If Host1 were to transfer a file to the
server, what layers of the TCP/IP model would be used?
application,
session, transport, network, data link, and physical layers
only
Internet and network access layers
only
application and Internet layers
only
application, transport, network, data link, and physical layers
application,
transport, Internet, and network access layers
only
application, Internet, and network access layers
18. Which address does a NIC use when deciding whether to accept a
frame?
source
MAC address
destination
MAC address
destination
IP address
source
Ethernet address
source
IP address
19. A web client is sending a request for a webpage to a web server.
From the perspective of the client, what is the correct order of the protocol
stack that is used to prepare the request for transmission?
Ethernet,
IP, TCP, HTTP
HTTP,
IP, TCP, Ethernet
Ethernet,
TCP, IP, HTTP
HTTP,
TCP, IP, Ethernet
20. Option 4: taking the
segments from the transport protocol, encapsulating them into packets, and
assigning them with appropriate addresses. Press spacebar to enter matching
mode.
Match the protocol function to the description while taking into
consideration that a network client is visiting a web site. (Not all options
are used.)
application protocol
governing the way a web server and a web client interact
internet protocol
taking the segments from the transport protocol, encapsulating
them into packets, and assigning them with appropriate addresses
network access protocol
preparing packets to be transmitted over the network media
network time protocol
transport protocol
managing the
individual conversations between web servers and web clients
21. Which PDU is processed when a host computer is de-encapsulating
a message at the transport layer of the TCP/IP model?
frame
segment
bits
packet
22.
HostA is connected to RouterA through SwitchA. RouterA connects
to RouterB via a serial link. RouterB is connected to ServerB through SwitchB.
Refer to the exhibit. HostA is attempting to contact ServerB.
Which two statements correctly describe the addressing that HostA will generate
in the process? (Choose two.)
A
packet with the destination IP address of ServerB.
A
frame with the destination MAC address of SwitchA.
A
packet with the destination IP address of RouterA.
A
packet with the destination IP address of RouterB.
A
frame with the destination MAC address of ServerB.
A
frame with the destination MAC address of RouterA.
Hey there, We are Blossom Themes! We are trying to provide you the new way to look and use the blogger templates. Our designers are working hard and pushing the boundaries of possibilities to widen the horizon of the regular templates and provide high quality blogger templates to all hardworking bloggers!