Revison sheet 2

.pdf
School
American Public University**We aren't endorsed by this school
Course
ISY 315
Subject
Computer Science
Date
Jan 10, 2025
Pages
10
Uploaded by PrivateIbexMaster279
Networks & Communications Revision sheet MULTIPLE CHOICE QUESTIONS: - 1. When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? Choose all the validanswer choices)A. Bridges are faster than switches because they have fewer ports. B. A switch is a multiport bridge, C. Bridges and switches learn MAC addresses by examining the source MAC address ofeach frame received. D. A bridge will forward a broadcast but a switch will not. E. Bridges and switches increase the size of a collision domain. F. None of the above statements are true. 2. The LAN needs are expanding at the AASTMT corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the AASTMT network.Which of the following are layer 1 devices that you can use? (Choose all that apply.)A. A switch B. A router C. A network adapter card D. A hub E. A repeater 3. Cisco is the leader in the router market space. What basic functions do their routers perform in a network? (Choose two)A. The micro-segmentation of broadcast domains B. Path selection C. Packet switching D. Bridging between LAN segments E. Access layer security F. VLAN membership assignment G. Application optimization 4. Both bridges are switches are being used throughout the AASTMT LAN. Which ofthe following statements are true regarding bridges and switches in this network?(Choose 3)A. Switches are primarily software based while bridges are hardware based. B. Switches usually have a higher number of ports than most bridges. C. Bridges are frequently faster than switches. D. Bridges define broadcast domains while switches define collision domains. E. Both bridges and switches forward Layer 2 broadcasts. F. Both bridges and switches make forwarding decisions based on Layer 2 addresses. 5. The AASTMT network administrator needs to determine what LAN devices toinstall on the AASTMT network. What are two advantages of using Layer 2 Ethernet switches over hubs? (Choose one)A. Increasing the size of broadcast domains B. Increasing the maximum length of UTP cabling between devices C. Filtering frames based on MAC addresses D. Decreasing the number of collision domains 6. Two buildings on the London campus must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The administrator is concerned about possible problems from voltage potential differences between the two buildings. Whichmedia type should be used for the connection?A. Coaxial cable B. Fiber optic cable C. UTP cable D. STP cable E. None of the above
Background image
A. Physical Layer B. Datalink Layer C. Network Layer D. Session Layer E. Transport Layer F. Presentation Layer G. Application Layer A. The data link layer B. The application layer C. The access layer D. The session layer E. The network layer A. Application B. Presentation C. Session D. Transport E. Internet F. Data Link G. Physical A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 E. Layer 7 A. Application B. Presentation C. Session D. Transport E. Network F. Data-Link A. Physical B. Session C. Data link D. Transport E. Network F. Application G. Presentation A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 E. Layer 6 F. Layer 7 7. As NW administrator candidate, you must know the various layers of the OSImodel. At which layers of the OSI Model do Wide Area Networks operate in?(Choose two) 8. While troubleshooting a connectivity problem on the network, you issue the pingcommand from your PC command prompt, but the output shows "request times out." At which OSI layer is this problem associated with?9. You download a file from an FTP site on the Internet. What is the highest layer in theOSI model used in this FTP operation?10. A host computer has been correctly configured with a static IP address, but thedefault gateway is incorrectly set. Which layer of the OSI model will be first affectedby this configuration error?11. Which layer of the OSI reference model is responsible for ensuring reliable end-to-end delivery of data?12. At which OSI layer is a logical path created between two host systems named TK1 and TK2 on the AASTMT LAN? 13. Which OSI layer is associated with the following: The acknowledgement oftransmissions, sequencing, and flow control across a network?
Background image
14. Which OSI layer header contains the address of a destination host that is onanother network? A. Application B. Presentation C. Session D. Transport E. Network F. Data link G. Physical 15. Which of the following correctly describe steps in the OSI data encapsulationprocess? (Choose two) A. The presentation layer translates bits into voltages for transmission across the physical link. B. The transport layer divides a data stream into segments and adds reliability and flow control information. C. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. D. The data link layer adds physical source and destination addresses and an FCS to the segment. E. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information. 16. Which Layer 4 protocol is used for a Telnet connection between two AASTMTrouters?A. IP B. ICMP C. DNS D. TCP E. UDP F. RTP 17. AASTMT is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions, What is the best network device to which to directly connect the phones and computers? A. VLAN B. Sub-interface C. STP D. Hub E. Switch F. Router G. Wireless Access Point H. VTP 18. You work as a network technician at TestKing.com. You have been assigned thetask of designing a new TestKing internetwork. The main priority is to achieve the highest reliability available. TestKing.com is willing to spend more dollars to avoiddowntime caused by link failure.Which of the following four designs is to be preferred?
Background image
A. Design TestKingA B. Design TestKingB C. Design TestKingC D. Design TestKingD 19. While troubleshooting a network connectivity problem, a TestKing technicianobserves steady link lights on both the workstation NIC and the switch port towhich the workstation is connected. However, when the ping command is issuedfrom the workstation, the output message "Request timed out." is displayed. At which layer of the 7-layer OSI model does the problem most likely exist?A. The data link layer B. The application layer C. The protocol layer D. The access layer E. The session layer F. The network layer G. None of the above 20. Which layer does the SMTP work at? A. InternetB. TransportC. Link D. Application 21. You need to make a secure communication using HTTPS. What port number is used by default? A. 80 B. 23 C. 21 D. 443 22. Which of the following protocols is used by mail servers to exchange messages with one another? A. POP3 B. IMAP4 C. SMTP D. HTTPS
Background image
23. If you use either Telnet or FTP, which layer you are using to transmit data? A. Application B. Internet C. Link D. Transport 24. Which layer does the IP protocol run at? A. Application Layer B. Internet Layer C. Transport Layer D. Link Layer 25. Which of the following protocols is a “transport-layer” protocol? A. SFTP B. IP C. ARP D. UDP 26. A computer with a subnet mask of 255.255.255.0 has how many octets for the network ID? A. 1 B. 2 C. 3 D. 4 27. Which protocol is responsible for mapping an IP address to the MAC address? A. IP B. TCP C. ARP D. ICMP 28. Which protocol is responsible for connection-oriented communication? A. TCP B. IP C. UDP D. ICMP 29. Which protocol is responsible for error reporting and status information? A. ICMP B. TCP C. UDP D. IP 30. Which protocol is responsible for logical addressing and delivery of packets? A. ICMP B. TCP C. IP D. UDP 31. How many binary bits are in an IPv6 address? A. 32 bits B. 64 bits C. 128 bits D. 256 bits
Background image
32. What protocol helps multiple devices share the bandwidth evenly without having two devices transmit at the same time on the network medium? A. TCP/IP B. CSMA/CD C. Three-way Handshaking D. ICMP 33. A computer with the IP address of 134.67.89.12 and a subnet mask of 255.255.0.0 is on the same network with which of the following systems? A. 128.76.89.12 B. 134.67.112.23 C. 13.4.67.34 D. 109.67.45.10 34. Which network service is responsible for automatically assigning IP addresses out to clients on the network? A. DNS B. ARP C. DHCP D. TCP 35. Any IP address whose first octet starts with a binary value of (10), is typically: A. Class A B. Class B C. Class C D. Class D 36. Which network address class supports only 254 hosts? A. Class A B. Class B C. Class C D. Class D 37. What is the default subnet mask for a class C network? A. 255.0.0.0 B. 225.225.0.0 C. 255.255.255.0 D. 225.255.255.255 38. How many octets are in an IPv4 address? A. 2 B. 4 C. 6 D. 8 39. In binary, how do you specify the broadcast address of a network range? A. All host bits are set to 0 B. All host bits are set to 0, except for the low-order bit C. All host bits are set to 1, except for the low-order bit D. All host bits are set to 1 40. What is the well-known port number for the HTTP service? A. 20 B. 21 C. 80 D. 25
Background image
41. Which of the following addresses is a “Class C” IP address? A. 240.1.1.34 B. 196.167.34.5 C. 126.16.7.99 D. 191.108.56.7 42. Which command is used to generate the following output? Interface: 10.10.10.101 Internet Address Physical Address Type 12.10.10.1 00-2b-1c-d5-10-f9 static 12.10.10.10 00-06-6b-8e-4e-e3 dynamic 12.10.10.19 00-c0-ae-d0-bb-f5 dynamic A. TRACERT 10.10.10.101 B. NETSTAT C. ARP -a D. IPCONFIG 43. Which protocol is used to retrieve messages from a mail server, without deleting them on the server? A. SMTP B. IMAP4 C. POP3 D. HTTPS 44. Which classful IP range is assigned to the network of AAST which contains around 10,000 network users (hosts)? A. Class A B. Class B C. Class C D. Class D 45. An IP address (127.0.0.1) is reserved for: A. Loopback tests B. Broadcasting C. Partitioning the network (127) into several network segments D. Subnetting the IP addresses of Class A and Class B 46. The last valid address of a host is always: A. One more than the broadcast address B. One less than the broadcast address C. One more than the network ID D. One less than the network ID 47. Which command was used to generate the following command output? 1 <10 ms <10 ms <10 ms 192.168.0.254 2 <10 ms <10 ms <10 ms 12.127.106.34 3 40 ms 40 ms 50 ms r04.nycmny01.verio.net [129.250.10.37] 4 40 ms 40 ms 40 ms r20.nycmny01.verio.net [129.250.2.36] 5 40 ms 40 ms 50 ms r00.nwrknj01.verio.net [129.250.2.216] 6 110 ms 121 ms 120 ms 192.94.118.221 7 110 ms 130 ms 120 ms www.novell.com [130.57.4.27] A. tracert www.novell.com B. ping www.novell.com C. ping 130.57.4.27 D. tracert 192.168.0.254 / 130.57.4.27
Background image
48. You are having trouble connecting to resources on the Internet, so you use the IPCONFIG utility to verify your TCP/IP configuration. The configuration is shown. Ethernet adapter Lan Connection: Connection-specific DNS Suffix . : glensworld.loc IP Address. . . . . . . . . . . . : 192.168.1.100 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.1.1 Your configuration seems to be accurate. Which command would you type next to help determine what the problem is? A. Ping glensworld.loc B. Ping 192.168.1.100 C. Ping 192.168.1.1 D. Ping 192.168.1.255 49. What is the subnet mask for 171.103.2.30? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255 50. Which utility is used to determine the path that data takes to a remote host? A. NETSTAT B. ARP C. FTP D. TRACERT 51. Which utility is used to facilitate file transfers between two remote hosts? A. FTP B. TRACERT C. PING D. None of the above 52. Which of the following is a typical IPv6 address? A. 65-b3-b8-34-45-a3 B. 65b3 : b834 : 45a3 : 0000 : 0000 : 762e : 0270 : 5224 C. 65b3 : b834 : 45a3 : 0000 : 0000 : 762e D. None of the above 53. Which of the following protocols has a header that contains an Acknowledgment Number field? A. UDP B. TCP C. IP D. All of the above 54. You are troubleshooting to determine why Omar’s computer cannot connect to the Internet. What command would you type to view all of Omar’s TCP/IP settings in a MS Windows command prompt? A. ipconfig * B. ipconfig /all C. ipconfig /showall D. ipconfig /displayall
Background image
55. The following output was generated from which command? Reply from 10.10.10.1: bytes>32 time<1ms TTL>128 Reply from 10.10.10.1: bytes>32 time<1ms TTL>128 Reply from 10.10.10.1: bytes>32 time<1ms TTL>128 Reply from 10.10.10.1: bytes>32 time<1ms TTL>128 Ping statistics for 10.10.10.1: Packets: Sent > 4, Received > 4, Lost > 0 (0% loss), Approximate round trip times in milli-seconds: Minimum > 0ms, Maximum > 0ms, Average > 0ms A. TRACERT 10.10.10.1 B. ROUTE 10.10.10.1 C. PING 127.0.0.1 D. PING 10.10.10.1 56. What decimal value is equivalent to (11000000 . 10101000 . 00110000 . 00001100)? A. 192.168.48.12 B. 192.168.48.24 C. 192.168.64.12 D. 192.168.32.24 57. Which utility is used to verify network connectivity of a remote host? A. NETSTAT B. ARP C. PING D. None of the above 58. Which of the following are not reliability mechanisms used by TCP? A. Sequence numbers B. Acknowledgements C. The source and destination port numbers D. The sliding window size 59. In a TCP three-way handshake what does a SYN-ACK message indicate? A. First message of a three-way handshake B. Second message of a three-way handshake C. Third message of a three-way handshake D. Answers B and C
Background image
60. Refer to the following exhibit: What data structure is described in the exhibit shown above? A.IP datagram B. TCP Segment C. Ethernet Frame D. UDP Datagram E. None of the above SHORT ANSWERS 1. What field in the IP header is responsible for preventing a packet from endlessly looping through a network? 2. What field in the IP header verifies the correctness / integrity of the IP packet? 3. A host whose IP address is (192.168.1.3), subnet mask is (255.255.255.0), and the default gateway is (192.168.1.1), sends a message to another host whose IP address is (192.168.75.45). What is the IP address of the first hop in the route? 4. List the OSI model layers and TCP/IP layers in correct order and compare. 5. Which topology often results in multiple connections to a single site, leading to high degree of fault tolerance? 6. Transform each of the following values to its corresponding format in the following table. (Show your conversions on the next page). Hexadecimal Decimal (A3)16(123)10Best Wishes Header Length(4)Reserved (6)Code Bits (6)Window (16)Acknowledgment Number (32)Sequence Number (32)Source Port (16)Destination Port (16)TCP Checksum (16)Urgent Pointer (16)Options (0 or 32 if any)Data (varies)Bit 0Bit 15Bit 16Bit 314 Bytes (32 bits)TCP Header(20-24) bytes
Background image