Your browser does not support JavaScript!

Data Communications and Networking 1

Showing 76-150 of 271 answers

Presentation Layer is the 7th layer of the OSI model
  • True
  • False Correct
Protocol model provides a common reference for maintaining consistency within all types of network protocols and services.
  • True
  • False Correct
Protocols are rules that govern communications. It is made-up of a group of related protocols that are necessary to communicate via electronic means.
  • HTTP
  • IP
  • Network Protocols
  • Protocol Correct
Public Encryption Key is an encryption method.
  • True Correct
  • False
RDP stands for Reliable Data Protocol under Transport layer.
  • True Correct
  • False
Router can be considered as routers.
  • True Correct
  • False
Routers and USBs are considered as network hardware devices.
  • True
  • False Correct
Server provides data for a client.
  • True Correct
  • False
Standards provide flexibility for manufacturers to create devices that comply with unique requirements
  • Products from different manufacturers can interoperate successfully Correct
Subnet Mask used to define the Network portion and the Host portion
  • True Correct
  • False
Subnetting is the process of borrowing bits from the HOST bits, in order to divide the larger network into small subnets.
  • True Correct
  • False
TCP is used in HTTP web browsing and email transfer.
  • True Correct
  • False
TCP stands for Transmission Center Protocol.
  • True
  • False Correct
TCP/IP stands for?
  • Transfer Control Protocol/Integrated Protocol
  • Transfer Control Protocol/Internet Protocol
  • Transmission Control Protocol/Internet Protocol Correct
  • Transmission Control Protocol/Integrated Protocol
The 8-bit binary value for 41 is
  • 00101001 Correct
The address by which we refer to the network is called broadcast address
  • True
  • False Correct
The addresses assigned to the end devices in the network is called the host address
  • True Correct
  • False
The Application layer is the topmost layer of the OSI Model.
  • True Correct
  • False
The Ethernet ___ sublayer is responsible for communicating directly with the physical layer.
  • MAC Correct
The farther you are from the central office when utilizing a DSL connection, the ___ connection speed
  • slower Correct
The internet is an example of LAN.
  • True
  • False Correct
The last host address on the 10.15.25.0/24 network is
  • 10.15.25.254 Correct
The message received by the host usually contains multiple protocols, plus the actual data, which the Application Header (HTTP) may or may not exist.
  • TCP
  • HTTP
  • Multiple Protocols Correct
  • IP
The Network Layer is responsible for packet switching including routing.
  • True
  • False Correct
The Network Layer provides services to exchange the individual pieces of data over the network between identified end devices.
  • True Correct
  • False
The OSI Model has 7 layers
  • True Correct
  • False
The presentation layer can handle Character and String Conversion.
  • True Correct
  • False
The presentation layer can handle Data Compression and Graphics Handling.
  • True Correct
  • False
The relationship between clients and servers is known as the _____.
  • Network Protocols
  • Client-Server Model Correct
  • Network Topologies
  • Servers
The router is a networking device that forwards data packets between computer networks.
  • True Correct
  • False
The shortest compressed format of the IPv6 address 2001: 0DB8:0000:1470:0000:0000:0000:0200 is
  • 2001:DB8:0:1470::200 Correct
The subnet mask has 32 bits of Contiguous set of 1's followed by a contiguous set of 0's
  • True Correct
  • False
The TCIP/IP Model is mapped to the OSI Model.
  • True Correct
  • False
The TCP/IP application layer effectively consists of which three OSI layers?
  • Application, presentation, session Correct
The TCP/IP is also known as the DOD Model.
  • True Correct
  • False
The TCP/IP Model has 7 layers.
  • True
  • False Correct
The transport layer is responsible for receiving the information from the application process on the devices.
  • True
  • False Correct
The Transport Layer provides a protocol for host-to-host connection.
  • True Correct
  • False
The Transport Layeris a method of dividing the architectural protocols in the Internet Protocol Suite and Open System Interconnection
  • True Correct
  • False
These are the computing device that interconnects which has an IP address that is unique for every computing device such as laptops, personal computers, printers, workstations, smart phones, IP Cameras, etc.
  • Network Interface cards
  • Network Routers
  • End-devices Correct
  • Intermediary Devices
These describe processes such as the format or structure of the message, the process by which networking devices share information about pathways with other networks.
  • HTTP
  • Network Protocols Correct
  • IP
  • Protocol
This interconnects a number of LANs using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to WANs and the Internet.
  • MAN Correct
  • LAN
  • WAN
  • Topologies
This is a device connecting multiple computers together and makes them perform the functions as a single unit.
  • Switches
  • Router
  • NIC
  • Hub Correct
This is a model that breaks down network function. This is the most popular type of internetwork reference model. Consist of seven layers.
  • Reference Model
  • OSI Model Correct
  • TCP/IP Model
  • Protocol Model
This is a network topology in which every computer and network device is connected to single cable.
  • Bus Correct
  • Ring
  • Star
  • Mesh
This is a topology that forms a ring as each computer is connected to another computer, with the last one connected to the first.
  • Bus
  • Mesh
  • Star
  • Ring Correct
This is a type of topology all the computers are connected to a single hub through a cable.
  • Mesh
  • Ring
  • Bus
  • Star Correct
This is an individual network that usually spans a single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region.
  • Topologies
  • MAN
  • WAN
  • LAN Correct
This is Layer 1 of the TCP/IP model.
  • Transport Layer
  • Network Access Layer Correct
  • Application Layer
  • Internet Layer
This is Layer 3 of the TCP/IP Model
  • Internet Layer
  • Application Layer
  • Network Access Layer
  • Transport Layer Correct
This is Layer 6 of the OSI Model.
  • Physical Layer
  • Application Layer
  • Session Layer
  • Presentation Layer Correct
This is the layer 7 of the OSI Model.
  • Physical Layer
  • Session Layer
  • Application Layer Correct
  • Presentation Layer
This is the topmost layer of the OSI Model.
  • Application Layer Correct
  • Session Layer
  • Physical Layer
  • Presentation Layer
This is the uppermost sublayer which manages the data flow control, acknowledgement and error notification.
  • Physical Layer
  • MAC
  • Logical Link Control Layer Correct
  • Data Link Layer
This layer in the OSI model describes the mechanical, electrical, functional, and procedural means to activate, maintain, and deactivate physical connections for bit transmission and to and from a network device.
  • Session Layer
  • Application Layer
  • Presentation Layer
  • Physical Layer Correct
This layer in the OSI model provides proper common data format that is sent across Application Layer services.
  • Presentation Layer Correct
  • Session Layer
  • Application Layer
  • Physical Layer
This layer is concerned with the encoding, decoding and logical organization of data bits.
  • MAC
  • Data Link Layer Correct
  • Logical Link Control Layer
  • Physical Layer
This model is also known as the DOD (Department of Defense) Model. This is the protocol that is used in the internet.
  • Protocol Model
  • TCP/IP Model Correct
  • OSI Model
  • Reference Model
This model provides a common reference for maintaining consistency within all types of network protocols and services.
  • TCP/IP Model
  • Protocol Model
  • OSI Model
  • Reference Model Correct
This network type is much smaller than WAN and can span between cities.
  • WAN
  • LAN
  • MAN Correct
  • Topologies
This provides a model that is closely equivalent to the structure of a certain protocol.
  • Protocol Model Correct
  • Reference Model
  • TCP/IP Model
  • OSI Model
To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
  • Tab Correct
Transport Layer is identified as the 5th layer in OSI.
  • True
  • False Correct
WAN stands for Wide Area Network.
  • True Correct
  • False
What are the parts of an IPv4 address? (Choose two.)
  • · Network · Host Correct
What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer? (Choose three.)
  • · Error detection · Frame delimiting · Addressing Correct
What are the primary purposes of the transport layer? (Choose three.)
  • · Identifying the proper application for each communication stream · Segmenting data for and reassembling segmented data into streams of application data at the destination · Tracking the individual communication between applications on the source and destination hosts Correct
What are the primary requirements of information security? (Choose three.)
  • Confidentiality Integrity Availability Correct
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
  • · providing better social media opportunities · providing a richer e-learning environment Correct
What are two functions of end devices on a network? (Choose two.)
  • · They are the interface between humans and the communication network. · They originate the data that flows through the network. Correct
What are two functions that are provided by the network layer? (Choose two.)
  • · directing data packets to destination hosts on other networks · providing end devices with a unique network identifier Correct
What command will display a list of keywords available for viewing the status of an IOS switch?
  • Switch# show? Correct
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
  • (config) # service password-encryption Correct
What does UDP do when receiving messages that are more than one datagram in length?
  • UDP reassembles that data in the order it was received and passes it to the application. Correct
What happens if part of an FTP message is not delivered to the destination?
  • The part of the FTP message that was lost is re-sent Correct
All courses