Your browser does not support JavaScript!

Data Communications and Networking 1

Showing 151-225 of 271 answers

What happens to frames that are too long or too short for the channel used?
  • They are dropped. Correct
What happens when a data collision occurs on an Ethernet bus?
  • All devices stop transmitting and try again later. Correct
What happens when two devices on the same subnet are communicating?
  • The host portion of the IP addresses will be different Correct
What is a characteristic of a contention-based access method?
  • It is as nondeterministic method Correct
What is a characteristic of a WAN hub-and-spoke topology?
  • The branch sites are connected to a central site through point-point links Correct
What is a characteristic of UDP? What range of ports can either be used by TCP or UDP to identify the requested service on the destination device or as a client source port?
  • 1024 to 49151 Correct
What is a converged network?
  • A network where voice, video, and data move over the same infrastructure Correct
What is a fault-tolerant network?
  • A network that can reroute traffic in case of device failure Correct
What is a group of web pages that groups of individuals can edit and view together called?
  • Wiki Correct
What is a network infrastructure that provides access to other networks over a wide geographic area?
  • LAN
  • WAN Correct
What is a wiki?
  • a web page that groups of people can edit and review Correct
What is an advantage of UDP over TCP?
  • UDP communication requires less overhead Correct
What is an advantage of using standards to develop and implement protocols?
  • Products from different manufacturers can interoperate successfully Correct
What is an advantage that UDP has over TCP?
  • Low overhead Correct
What is and advantage of using standards to develop and implement protocols?
  • Products from different manufacturers can interoperate successfully Correct
What is assigned by the transport layer to identify an application or service?
  • Port Correct
What is encrypted with the enable secret command?
  • the privileged executive mode password Correct
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
  • Command Correct
What is the Cisco IOS?
  • The operating system for the Cisco network device Correct
What is the command netstat –r used for?
  • to display the host routing table Correct
What is the function of the kernel of an operating software?
  • The kernel provisions hardware resources to meet software requirements. Correct
What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3?
  • 64 bytes – 1518 bytes Correct
What is the name given to a one-to-many message delivery option?
  • Multicast Correct
What is the name given to the Ethernet MAC sublayer PDU?
  • Frame Correct
What is the primary defense against unauthorized remote access to network devices?
  • Configuring a VTY password Correct
What is the purpose of protocols in data communications?
  • providing the rules required for a specific type of communication to occur Correct
What is the purpose of the physical link control field in a data link layer header?
  • to establish the media link Correct
What is the purpose of using a source port number in a TCP communication?
  • to keep track of multiple conversations between devices Correct
What is the transport layer PDU?
  • Segment Correct
What is true about the Ethernet MAC address? (Choose three.)
  • · The first 6 hexadecimal digits of a MAC address represent the OUI. · The vendor is responsible for assigning the last 24 bits of the MAC address. · The MAC address is also known as a burned-in address. Correct
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
  • flow control Correct
What name is given to a group of interrelated protocols necessary to perform a communication function?
  • Protocol suite Correct
What organization is responsible for the overall management and development of Internet standards?
  • IAB Correct
What process is used to place one message inside another message for transfer from the source to the destination?
  • encapsulation Correct
What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)
  • · message size · data encoding · delivery options Correct
What three protocols do email users and servers use to process email? (Choose three.)
  • · SMTP · POP3 · IMAP4 Correct
What two criteria are used to help select a network medium from various network media? (Choose two.)
  • · the distance the selected medium can successfully carry a signal · the environment where the selected medium is to be installed Correct
What type of address is 01-00-5E-0A-00-02?
  • an address that reaches a specific group of hosts Correct
What type of communication will send a message to all devices on a local area network?
  • broadcast Correct
What type of connection to a Cisco IOS switch is used to make the initial configuration?
  • Console port Correct
What type of delivery uses data link layer addresses?
  • local delivery Correct
What type of information would be found on a logical topology diagram?
  • IP addressing scheme Correct
What type of protocol describes communication over a data link and the physical transmission of data on the network media?
  • Network access protocol Correct
What will a network administrator use to modify a configuration on a Cisco router?
  • IOS Correct
When a client connects to an HTTP server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response?
  • the original source port number that was randomly generated by the client Correct
When is a wired connection preffered to a wireless connection by an end-user device?
  • when the end-user device will run an application that requires a dedicated connection to the network Correct
When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the CLI, what will be returned in the CLI?
  • EaSt-2+56(config)# Correct
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?
  • Flow Label Correct
Where is the configuration used during startup on Cisco IOS devices located?
  • Startup config Correct
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
  • The client sends a synchronization segment to begin the session Correct
Which address is a multicast MAC address?
  • 01-00-5E-00-00-C8 Correct
Which address is used as a destination address on a broadcast Ethernet frame?
  • FF-FF-FF-FF-FF-FF Correct
Which among the following discuss about Layer 2 addresses?
  • All of the above Correct
  • It is unique on the local network and represents the address of the end device on the physical media
  • It is concerned with the transmission of messages on a single local network
  • Includes the host physical address
Which among the following sentences is CORRECT about Physical Layer?
  • Physical Layer protocols encodes and decodes the data bits
  • The Physical Layer transmit the messages on a single local network
  • Physical Layer is assigned with the most of the network's physical connections Correct
  • Physical Layer's sub layer is the MAC
Which application layer protocol allows users on one network to reliably transfer files to and from a host on another network?
  • FTP Correct
Which application use UDP as the transport layer protocol?
  • SMTP Correct
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school
  • wireless LAN Correct
Which command or key combination allows a user to return to the previous level in the command hierarchy?
  • exit Correct
Which destination address is used in an ARP request frame?
  • FFFF.FFFF.FFFF Correct
Which device acts as gateway to allow hosts to send traffic to remote IP networks?
  • local router Correct
Which device performs the function of determining the path that messages should take through internet works?
  • a router Correct
Which devices would be considered end devices on a network? (Choose four.)
  • · IP phone · Tablet computer · Server · Printer Correct
Which entities are involve in a temporary communication that is established by the transport layer?
  • applications Correct
Which entities are involved in a temporary communication that is established by the transport
  • applications Correct
Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?
  • gateway of last resort Correct
Which field in an Ethernet frame is used for error detection?
  • Frame Check Sequence Correct
Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to the interface?
  • no switchport Correct
Which is a function of the Logical Link Control (LLC) sublayer?
  • to identify which network layer protocol is being used Correct
Which logical address is used for delivery of data to a remote network?
  • destination IP address Correct
Which message delivery option is used when all devices need to receive the same message simultaneously?
  • broadcast Correct
Which message timing factor impacts how much information can be sent and the speed at which it can be delivered
  • Flow control Correct
Which number or set of numbers represents a socket?
  • 192.168.1.1:80 Correct
Which of the following are business-class Internet connection technologies normally supplied by a service provider? (Choose two.)
  • Leased lines Metro Ethernet Correct
Which of the following are disadvantages of peer-to-peer networking? (Choose two.)
  • Scalability No centralized administration Correct
Which of the following are examples of proprietary protocols? (Choose two.)
  • Novell NetWare AppleTalk Correct
All courses