Fundamentals of Data Communications Mid-Term

¡Supera tus tareas y exámenes ahora con Quizwiz!

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used? 10.0.0.0 10.1.100.0 10.1.0.0 10.1.100.32

10.1.0.0

How does BYOD change the way in which businesses implement networks? ​BYOD requires organizations to purchase laptops rather than desktops. BYOD devices are more expensive than devices that are purchased by an organization. BYOD provides flexibility in where and how users can access network resources. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.

BYOD provides flexibility in where and how users can access network resources.

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? Ethernet, TCP, IP, HTTP HTTP, IP, TCP, Ethernet Ethernet, IP, TCP, HTTP HTTP, TCP, IP, Ethernet

HTTP, TCP, IP, Ethernet

Which statement is true about the running configuration file in a Cisco IOS device? It should be deleted using the erase running-config command. It is stored in NVRAM. It affects the operation of the device immediately when modified. It is automatically saved when the router reboots.

It affects the operation of the device immediately when modified.

What is the function of the shell in an OS? It provides the intrusion protection services for the device. It interfaces between the users and the kernel. It provides dedicated firewall services. It interacts with the device hardware

It interfaces between the users and the kernel.

What is an ISP? It is a networking device that combines the functionality of several different networking devices in one. It is a protocol that establishes how computers within a local network communicate. It is an organization that enables individuals and businesses to connect to the Internet. It is a standards body that develops cabling and wiring standards for networking.

It is an organization that enables individuals and businesses to connect to the Internet.

What is done to an IP packet before it is transmitted over the physical medium? It is tagged with information guaranteeing reliable delivery. It is encapsulated in a Layer 2 frame. It is segmented into smaller individual pieces. It is encapsulated into a TCP segment.

It is encapsulated in a Layer 2 frame.

What is the Internet? It provides connections through interconnected global networks. It provides network access for mobile devices. It is a network based on Ethernet technology. It is a private network for an organization with LAN and WAN connections.

It provides connections through interconnected global networks.

Which memory location on a Cisco router or switch stores the startup configuration file? flash ROM NVRAM RAM

NVRAM

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? Reload the device and type yes when prompted to save the configuration. Copy the information in the startup configuration file to the running configuration. Copy the running configuration to the startup configuration file. Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

Which memory location on a Cisco router or switch will lose all content when the device is restarted? NVRAM flash ROM RAM

RAM

What is the default SVI on a Cisco switch? VLAN99 VLAN1 VLAN999 VLAN100

VLAN1

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network? BYOD IPS ACL VPN

VPN

In which scenario would the use of a WISP be recommended? an Internet cafe in a city an apartment in a building with cable access to the Internet a farm in a rural area without wired broadband access any home with multiple wireless devices

a farm in a rural area without wired broadband access

Which device performs the function of determining the path that messages should take through internetworks? a DSL modem a firewall a router a web server

a router

Which functionality is provided by DHCP? automatic assignment of an IP address to each host remote switch management translation of IP addresses to domain names end-to-end connectivity test

automatic assignment of an IP address to each host

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe? bring your own device online collaboration cloud computing video conferencing

bring your own device

What type of communication will send a message to all devices on a local area network? allcast unicast multicast broadcast

broadcast

Which message delivery option is used when all devices need to receive the same message simultaneously? broadcast unicast multicast duplex

broadcast

What process is used to receive transmitted data and convert it into a readable message? decoding encapsulation access control flow control

decoding

Which logical address is used for delivery of data to a remote network? source MAC address destination MAC address source IP address destination IP address destination port number

destination IP address

What process is used to place one message inside another message for transfer from the source to the destination? decoding encapsulation access control flow control

encapsulation

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? Internet extranet intranet extendednet

extranet

Which type of communication will send a message to a group of host destinations simultaneously? broadcast unicast anycast multicast

multicast

Which type of access is secured on a Cisco router or switch with the enable secret command? privileged EXEC console line virtual terminal AUX port

privileged EXEC

What is the general term that is used to describe a piece of data at any layer of a networking model? segment packet protocol data unit frame

protocol data unit

What is the purpose of protocols in data communications? specifying the bandwidth of the channel or medium for each type of communication specifying the device operating systems that will support the communication providing the rules required for a specific type of communication to occur dictating the content of the message sent during communication

providing the rules required for a specific type of communication to occur

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users? quality of service scalability reliability accessibility

scalability

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? zero-day attack DoS attack​ spyware identity theft

spyware

What type of network must a home user access in order to do online shopping? the Internet a local area network an intranet an extranet

the Internet

In computer communication, what is the purpose of message encoding? to convert information to the appropriate form for transmission to break large messages into smaller frames to negotiate correct timing for successful communication to interpret information

to convert information to the appropriate form for transmission

Why would a technician enter the command copy startup-config running-config? to copy an existing configuration into RAM to save an active configuration to NVRAM to remove all configurations from the switch to make a changed configuration the new startup configuration

to copy an existing configuration into RAM

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices? transport presentation network session application

transport

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display? setup mode global configuration mode user EXEC mode privileged EXEC mode

user EXEC mode


Conjuntos de estudio relacionados

C 207 Data Driven Decision Making

View Set

World Geography A - Unit 1 (Primavera - Online)

View Set

Issues Related to Pediatric Health

View Set

Med-Surg I: ATI Practice Cardiovascular

View Set

Disease Conditions Ch 7 Poss ? may be on test.

View Set

PASS 610 - Exam 3 - Pelvis & Pelvic Viscera

View Set

Direct Variation, Constant of Proportionality, and Slope

View Set