CAB303 Week 1-6

¡Supera tus tareas y exámenes ahora con Quizwiz!

Suppose you are working for a company which has been given a block address of 192.168.2.0/24. You also have a Customer Service department which has 50 computers which will need to be connected to the network, as well as an IT department and an HR department which only require space for 25 computers each. Which of the following is the subnet mask which will support all 3 of these subnets? /27 /25 /26 /28

/26

Suppose that you have been given a block address of 131.181.128.0/24. Which of the following subnet masks can be used to create 16 subnets of equal size? /27 /29 /26 /28

/28

Suppose that you have been given a block address of 192.168.1.128/25. You want to create a number of subnets such that each can hold 6 hosts. Which of the following subnet masks will achieve this while providing the maximum possible number of subnets? /31 /28 /30 /29

/29

Match the following ports to the processes and protocols they are usually associated with 1. 80 2. 123 3. 22 4. 53 A. HyperText Transfer Protocol B. Domain Name System C. Network Time Protocol D. Secure Shell Protocol

1. 80 HyperText Transfer Protocol 2. 123 Network Time Protocol 3. 22 Secure Shell Protocol 4. 53 Domain Name System

What is the order of network layers between a user attempting to send data over a network and the network medium? Network Interface Card (NIC) Network Software Network Protocol Application

1. Application 2. Network Software 3. Network Protocol 4. Network Interface Card (NIC)

Order the following steps a router takes after receiving a Layer 2 Frame. (Assume that the TTL is greater than 0) Encapsulate the packet in a frame and send it to the next hop Find the best match for the destination address in the routing table Evaluate the TTL and determine that it is greater than 0 De-encapsulate the frame to find a Layer 3 Packet Decrement the TTL

1. De-encapsulate the frame to find a Layer 3 Packet 2. Evaluate the TTL and determine that it is greater than 0 3. Decrement the TTL 4. Find the best match for the destination address in the routing table 5. Encapsulate the packet in a frame and send it to the next hop

Place the following network media in order of greatest to least data rate Wi-Fi Unshielded Twisted Pair Fibre-Optic Cables Shielded Twisted Pair

1. Fibre-Optic Cables 2. Shielded Twisted Pair 3. Unshielded Twisted Pair 4. Wi-Fi

Order the following steps that OSPF uses to create a Link State Table Build Link State Packets out of a list of the router's neighbours Build a network topology based on the information it has received from its neighbours Send a Link State Packet to every one of its neighbours Send a "Hello" packet to directly connected neighbouring routers

1. Send a "Hello" packet to directly connected neighbouring routers 2. Build Link State Packets out of a list of the router's neighbours 3. Send a Link State Packet to every one of its neighbours 4. Build a network topology based on the information it has received from its neighbours

Order the steps of a TCP 4-way handshake The client sends an ACK packet The server sends an ACK packet The client sends a FIN packet The server sends a FIN packet

1. The client sends a FIN packet 2. The server sends an ACK packet 3. The server sends a FIN packet 4. The client sends an ACK packet

Match each of the following binary expressions of IPv4 addresses with their corresponding decimal expressions 11000000.10101000.00000001.11111110 131.181.196.203 00001000.00001000.00001000.00001000 8.8.8.8 10101101001.01111.00100.11101111001 192.168.1.254 10000011.10110101.11000100.11001011 Not Valid

11000000.10101000.00000001.11111110 192.168.1.254 00001000.00001000.00001000.00001000 8.8.8.8 10101101001.01111.00100.11101111001 Not Valid 10000011.10110101.11000100.11001011 131.181.196.203

Which of the following are valid MAC addresses for a device? (Check all that apply) 12:34:56:78:9a:bc ff:ff:ff:ff:ff:ff 00:f3:7d:a9:d5:ed 12:23:34:gf:ed:cb

12:34:56:78:9a:bc 12:23:34:gf:ed:cb

Suppose you have a network device to which you must assign an address. Which of the following are NOT valid IPv4 addresses? (Check all that apply) 1.1.1.1 172.22.64.255 610.111.2.34 192.168.1.0

172.22.64.255 610.111.2.34 192.168.1.0

On which of the following networks could you find the address 192.168.1.124? (Check all that apply) 192.0.0.0/8 192.168.1.0/16 192.168.1.0/24 192.168.1.0/25

192.0.0.0/8 192.168.1.0/16 192.168.1.0/24 192.168.1.0/25

What is the range of possible host addresses on the network 192.168.0.0/16? 192.168.0.1 - 192.168.255.254 192.168.0.1 - 192.168.1.255 192.168.0.1 - 192.168.254.254 192.168.1.0 - 192.168.1.254

192.168.0.1 - 192.168.255.254

Which of the following address can be found on the 192.168.1.0/25 network? 192.168.0.1 192.168.1.129 192.168.1.222 192.168.1.10

192.168.1.10

Suppose you have been given a block address of 192.168.1.0/24. Your organisation has a Customer Service department which has 100 computers which require network access. As such, you have created the 192.168.1.0/25 subnet to accommodate these computers. However, you have an HR department and an IT department which require space for 50 computers each. You choose to create a subnet for the IT department first. What should it be? 192.168.1.128/25 192.168.1.128/27 192.168.1.192/26 192.168.1.128/26

192.168.1.128/26

Which of the following addresses can be found on the 192.168.1.192/28 address block? (Check all that apply) 192.168.1.206 192.168.1.254 192.168.1.192 192.168.1.193

192.168.1.206 192.168.1.193

Which of the following IPv4 addresses belongs to Class C? 1.130.222.254 130.1.254.222 222.130.254.1 254.222.1.130

222.130.254.1

How many possible hosts are there for a /27 network? 126 62 30 14

30

Suppose that you have been given a block address of 200.200.0.0/16. How many subnets are created if you use a mask of /22 to divide them? 64 32 128 16

64

Which of the following is FALSE about dynamic routing? Dynamic routing can compensate for changing network topologies Dynamic routing usually incurs a processing cost at runtime A dynamic routing protocol only needs to be run once when a network is set up, and then works just like static routing Dynamic routing protocols involve routers sharing network information with one another

A dynamic routing protocol only needs to be run once when a network is set up, and then works just like static routing

Which of the following cables would be appropriate to connect a switch to a PC? A crossover cable A coaxial cable A straight-through cable A rollover cable

A straight-through cable

Which of the following is true about subnetting? (Check all that apply) Subnets typically lead to greater network traffic, as broadcast packets are sent to more devices A subnet borrows bits from the host ID to create space for more networks Subnets are only supported by IPv4, not IPv6 It is possible to sub-divide a subnet to create more, smaller subnets

A subnet borrows bits from the host ID to create space for more networks It is possible to sub-divide a subnet to create more, smaller subnets

Which of the following are advantages of wireless networking as compared to wired networking? (Check all that apply) Wired networking has a range limit, but wireless networking does not A wireless network cannot be attacked by a shark Wireless networking is faster than wired networking Wireless networking allows for devices to be more portable than wired networking

A wireless network cannot be attacked by a shark Wireless networking allows for devices to be more portable than wired networking

What is the purpose of the Address Resolution Protocol? ARP is responsible for reporting errors ARP is responsible for converting physical addresses into bits to be transmitted over a network medium ARP is responsible for resolving logical addresses to physical addresses on local networks ARP is responsible for ensuring packets are resent if an error has occurred in transmission

ARP is responsible for resolving logical addresses to physical addresses on local networks

When a frame collision is detected by an NIC, which of the following occurs? All stations that transmitted at that time must retransmit The first station to transmit must transmit again, the other are ignored The NIC chooses the order of transmission for the stations and requests each in turn to retransmit The NIC ignores all incoming packets for a set period of time before listening for transmissions again

All stations that transmitted at that time must retransmit

If two wireless devices are communicating directly with each other, with no central node, what is this called? An ad-hoc network An access point network A metropolitan area network A star network

An ad-hoc network

Which of the following are uses for the Internet Control Message Protocol? (Check all that apply) As the protocol used in the ping utility Signalling that a destination is unreachable Requesting that the target host lower the rate of messages sent Signalling that the Time to Live on a packet has been exceeded

As the protocol used in the ping utility Signalling that a destination is unreachable Requesting that the target host lower the rate of messages sent Signalling that the Time to Live on a packet has been exceeded

Which of the following is an error management system used by Ethernet? AES-128 Three-way Handshake Cyclic Redundancy Checking Redundant Transmission

Cyclic Redundancy Checking

Which of the following is true regarding DTE and DCE devices? The DTE performs signal conversion and encoding DTE and DCE devices are involved with communicating over a serial interface The DCE synchronises to the clock rate it is given The DTE provides the clock rate to the DCE

DTE and DCE devices are involved with communicating over a serial interface

Data is processed from the time an application creates it to the time it reaches the network medium. The process of adding information like addresses is referred to as what? Layering Packetisation Abstraction Encapsulation

Encapsulation

Which of the following network media is most difficult to eavesdrop on? Fibre-Optic Cable Unshielded Twisted Pair Cable Wireless (Wi-Fi, Bluetooth, etc.) Coaxial Cable

Fibre-Optic Cable

Which of the following protocols is the main protocol used in the traceroute utility? ICMP ARP TCP HTTP

ICMP

Suppose that a host receives an ARP frame which contains another host's IP address. What does it do in this scenario? It responds with a negative frame to indicate that it is not the host the originator is looking for It ignores and discards the frame It responds with the address of the host the originator is looking for It sends a recursive ARP frame looking for the host the originator is looking for

It ignores and discards the frame

Which of the following is true regarding the Application layer? - Common protocols at the Application layer include Internet Control Message Protocol (ICMP) and Internet Group Management Protocol (IGMP). - It ensures data is in the appropriate format before transmission. - The Application Layer accounts only for the client component of a communication. It is not used on servers. - It provides an interface for applications to access network services.

It provides an interface for applications to access network services.

A router connects five computers and a printer in a single office so the users can share the printer. What type of network is this configuration? Wide Area Network (WAN) Internetwork Local Area Network (LAN) Metropolitan Area Network (MAN)

Local Area Network (LAN)

Which of the following are true regarding Network Address Translation? (Check all that apply) Network Address Translation solves address depletion by providing an unlimited number of IP addresses Network Address Translation is a replacement for IPv6 Network Address Translation is an attempt to maximise the possible number of publicly routable addresses on the internet Network Address Translation hides the addresses of devices on private networks behind single public addresses

Network Address Translation is an attempt to maximise the possible number of publicly routable addresses on the internet Network Address Translation hides the addresses of devices on private networks behind single public addresses

Which layer is responsible for routing? Transport Layer Data Link Layer Network Layer Session Layer

Network Layer

Which of the following is NOT a basic IPv4 header field? Protocol length Source IP Address Total length Checksum

Protocol Length

Which of the following are advantages of the Open Shortest Path First protocol as compared to the Routing Information Protocol? (Check all that apply) Routers using OSPF do not need to inform their neighbours of network changes Routers using OSPF tend to generate less traffic to exchange information OSPF does not need to routinely update routing information OSPF is simpler to configure than RIP

Routers using OSPF tend to generate less traffic to exchange information OSPF does not need to routinely update routing information

Match the following protocol data units to their respective OSI Layers Segment Transport Layer Packet Network Layer Frame Data Link Layer Bit Physical Layer

Segment Network Layer Packet Physical Layer Frame Data Link Layer Bit Transport Layer

Suppose you are setting up the network for your grandmother's house. She has a laptop, a desktop, and a phone which she wants to connect to the network in a star topology for simple web browsing. What routing protocol is best for her router? Open Shortest Path First Routing Information Protocol Enhanced Interior Gateway Routing Protocol Static routing

Static routing

Which of the following are the benefits of statically configured routing as compared to dynamic routing? (Check allStatic routing that apply) Static routing can reroute traffic if a network node is unexpectedly made unavailable Static routing is best for networks with many routers at once Static routing has a lower runtime performance impact Static routing is extremely easy to implement on small networks

Static routing has a lower runtime performance impact Static routing is extremely easy to implement on small networks

Which of the following is true about supernetting? (Check all that apply) Supernetting can reduce the amount of upkeep necessary for changing network topologies Supernetting donates bits from the host ID to the network ID to aggregate routes Supernetting can speed up the routing process for very large networks Supernetting is usually performed by routers in order to reduce the size of routing tables

Supernetting can reduce the amount of upkeep necessary for changing network topologies Supernetting can speed up the routing process for very large networks Supernetting is usually performed by routers in order to reduce the size of routing tables

Which of the following is true regarding the Transmission Control Protocol? (Check all that apply) TCP provides error control using Retransmission Time Out (RTO) TCP allows data to be carried in two directions at once TCP does not check to ensure that all the frames it sent were correctly delivered TCP begins a connection with a four-way handshake

TCP provides error control using Retransmission Time Out (RTO) TCP allows data to be carried in two directions at once

Which of the following are true about Wi-Fi? (Check all that apply) The 5.0 GHz frequency has a higher data rate than 2.4 GHz The 2.4 GHz frequency is better able to penetrate solid objects than 5.0 GHz The wireless access point can be used to negotiate Clear-to-send windows for devices The only two channels usable in Wi-Fi are 2.4 GHz and 5.0 GHz

The 5.0 GHz frequency has a higher data rate than 2.4 GHz The 2.4 GHz frequency is better able to penetrate solid objects than 5.0 GHz The wireless access point can be used to negotiate Clear-to-send windows for devices

Which of the following is true regarding the encapsulation process for the OSI model? - The Presentation Layer adds logical source and destination addresses and a Frame Check Sequence to a segment - The Session Layer is responsible for breaking data down into smaller chunks called segments - The Network Layer adds Internet Protocol addresses and control information to a packet - The Data Link Layer translates bits into voltage to be transmitted

The Network Layer adds Internet Protocol addresses and control information to a packet

Which of the following is true regarding the OSI model? The primary disadvantage of the OSI model is that changes made to one layer affects the corresponding top and bottom layers accordingly. The OSI model is physical, not logical The OSI model defines only how data is processed within a single host before it is transmitted The OSI model is not specific to any protocol suite and can be applied to most networking protocols

The OSI model is not specific to any protocol suite and can be applied to most networking protocols

Which of the following is true regarding the Presentation Layer? (Check all that apply) - The Presentation Layer converts data into a format specified by the Application Layer - The Presentation Layer is responsible for setup and teardown process before and after a data transfer - The Presentation Layer can be used to handle functions such as encryption, decryption, and data compression or decompression - The Presentation Layer can be corrupted or jammed due to poor network cabling or high wireless traffic

The Presentation Layer converts data into a format specified by the Application Layer The Presentation Layer can be used to handle functions such as encryption, decryption, and data compression or decompression

What is the purpose of a port? To determine whether the message should be discarded by the machine that receives it To identify the message as IPv4 or IPv6 To act as an identifier for the specific process or application a message is intended for To delineate between TCP and UDP messages

To act as an identifier for the specific process or application a message is intended for

Which of the following are responsibilities of the Network Layer (Layer 3)? (Check all that apply) To route packets between networks To assign Internet Protocol addresses To resolve physical addresses into logical addresses To ensure network devices accurately execute commands they've been given

To route packets between networks To assign Internet Protocol addresses To resolve physical addresses into logical addresses

What are physical network addresses used for? (Check all that apply) To differentiate between a Layer 2 frame and a Layer 3 packet To allow devices on different networks to communicate To uniquely identify devices at Layer 2 To determine which device on the network should transmit first To allow two different devices on the same network to communicate

To uniquely identify devices at Layer 2 To allow two different devices on the same network to communicate

Which of the following are advantages to the User Datagram Protocol as compared to the Transmission Control Protocol? (Check all that apply) UDP produces less overall network traffic than TCP UDP guarantees that frames will be correctly sequenced, and TCP does not UDP has a lower runtime cost than TCP UDP has stronger error detection and correction than TCP

UDP produces less overall network traffic than TCP UDP has a lower runtime cost than TCP


Conjuntos de estudio relacionados

Chapter 24 Fundamentals of Nursing / Course Point Quiz 1

View Set

Cell Bio Final Review Nick and quiz

View Set

Interpret Linux File System Permissions

View Set

AIR 1002 Department of the Air Force

View Set

Types of Life Policies Ch2 Texas Life Insurance Exam

View Set