IS 345 Final, IS345 Quiz 9, IS 345 combo
After a client computer has joined to a domain, it can be centrally controlled by domain controllers. True False
True
All devices in a bus topology network are connected to a common cable segment.
True
An enterprise network security involves the use of network firewalls, perimeter networks or security zones.
True
An important function of a computer operating system is to provide an interface to access the computer's hardware.
True
Apple's iPhone operating system (iOS) is an example of a mobile operating system.
True
At layer 3 of the OSI model, the network to network data communication or the routing path is handled.
True
By default, Windows 10 OS is installed initially in a peer to peer networking mode.
True
Comparing with Microsoft Word, Notepad is a no overhead text editor.
True
Each Ethernet frame contains a sender's physical address and a receiver's physical address.
True
Each Ethernet frame contains a sender's physical address and a receiver's physical address. True False
True
Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or OUI?
00-0C-29
Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or the vendor's OUI? 00-0C-29-E5-84-25 00-0C-29 E5-84-25 Can not decide
00-0C-29
Each IPv6 address consists of two basic components: the network ID and the host ID. Host ID is also called extended unique identifier (EUI).
True
Each IPv6 address has 32 hexadecimal digits.
True
Each IPv6 address has a 2-components basic structure: the global routing index and the extended unique identifier (EUI).
True
Each IPv6 protocol header is 320 bits long fixed.
True
Each type of data communication application needs to be supported by a specific application layer protocol.
True
Each type of network based application needs to be supported by a corresponding application layer protocol.
True
Given an original IPv4 address 166.16.76.25, its default subnet mask is 255.255.0.0
True
Given the following IP address with its subnet mask. The network ID is: 158.20.50.66, subnet mask 255.255.0.0
True
HTTPS is an application layer protocol.
True
IEEE 802.11ac Wave 2 standard supports only 5GHz frequency band. True False
True
IEEE 802.11ax standard is backward compatible to 802.11a, 802.11b, and 802.11g networks.
True
IPv6 Global Unicast Address allows data to be sent across the Internet.
True
IPv6 address system allows for more efficient routing than IPv4.
True
IaaS allows ultimate flexibility in cloud service configurations.
True
IaaS allows ultimate flexibility in cloud service configurations. True False
True
If data needs to be transmitted from one subnet to another, a router and a default gateway will need to be used.
True
If data needs to be transmitted from one subnet to another, a router and a default gateway will need to be used. True False
True
In IPv6 protocol, there is no field designed for error checking.
True
Microsoft Windows firewall is a software program that can be configured to block incoming or outgoing data traffic based on TCP port numbers.
True
Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or the vendor's OUI?
00-0C-29 Vender = first three Factory Assigned = Last three
Refer to the above picture. What is the computer's physical address?
00-0C-29-E5-84-25
Refer to the attached picture. What is the computer's physical address?
00-0C-29-E5-84-25
An example of a physical address is ____.
00-C0-F0-27-64-E2
An example of a MAC address is ____.
00-C0-F0-27-64-E2 (Must be 12 hexadecimal digits long)
What is the subnet ID (in binary format) for the subnet to which the following IP address belongs? 100.75.125.200/11
010
Class A Address Range
1.0.0.0 - 126.0.0.0
What is the Host ID in the following CIDR IP address: 198.88.16.10/24?
10
Microsoft Windows firewall is a software program that can be configured to block incoming or outgoing data traffic based on TCP port numbers. True False
True
On a domain-based Widnows network, a client computer is identified by its FQDN.
True
On a domain-based client/server network, a client computer's desktop settings can be centrally controlled by the domain controller servers.
True
Putty program allows a remote connection to a Linux-based cloud server to be established.
True
TCP provides guaranteed delivery of data.
True
The 10 Gigabit Ethernet standard that can be implemented on MMF or SMF is called IEEE 802.3ae.
True
The IEEE 802.11 committe was created to define wireless Ethernet networking standards. True False
True
The Internet layer in the TCP/IP model is equivalent to the Network layer in the OSI model.
True
The TCP/IP networking model is also called the Internet networking model.
True
The Windows 10 operating system is designed and optimized to be a client OS.
True
The acronym MAN stands for Metropolitan Area Network.
True
The acronym WAN stands for Wide Area Network.
True
The data carried by UDP protocol can not be tracked.
True
The data carried with TCP protocol can be reliably transmitted.
True
The dual stack approach allows the coexistence of IPv4 and IPv6 addresses.
True
The hexadecimal notation format is used in IPv6 addressing system.
True
The hexadecimal value of the decimal number 400,000 is 61A80.
True
The location of a cloud server is a factor to consider when we choose a cloud server to use. True False
True
The logical address is used to determine on which network or subnet a computer is located.
True
The logoical network topology defines how data is transmittd in a network.
True
The minimum Ethernet frame size is 72 bytes.
True
The minimum Ethernet frame size is 72 bytes. True False
True
The original classful IPv4 addressing system has evolved into the current CIDR system.
True
The password "Summer2023" is a complex password but not a strong password.
True
The password "iS345$589" is a strong password. True False
True
There are no classes used in IPv6 addressing system.
True
To manage a large number of client computers effectively, a Windows domain can be created.
True
To manage a large number of client computers effectively, they can be put in a Windows domain which is created on servers called domain controllers. True False
True
To protect an enterprise network, we can consider using firewalls, perimeter networks or security zones. True False
True
To view IP address configurations on a Linux computer, we use the command ifconfig.
True
UDP is a transport layer protocol.
True
UDP is usually used to carry network status data from sender to receiver.
True
Using Windows advanced firewall, any TCP or UDP port can be blocked. True False
True
Wireless Ethernet uses the same frame format as its wired counterpart.
True
The password "iS345$589" is a strong password.
True Characteristics of a strong password: At least 6 characters long, Uppercase and lowercase letters, has at least one symbol character in the 2nd through 6th positions
Each wireless Ethernet network can be identified by its SSID.
True Wireless network name is the SSID (Service Set Identifier)
IEEE 802.11n is backward compatible to 802.11a, 802.11b, and 802.11g networks.
True 802.11n networks can operate at either 5 GHz or 2.4 GHz making them backward compatible. However, the older devices cannot exceed their original speed.
Ethernet switches operate at layer 2 of the OSI model.
True Data Link Layer
On a domain-based Widnows network, a client computer is identified by its FQDN.
True Fully Qualified Domain Name (FQDN)
TCP protocol provides guaranteed delivery of data.
True (UDP does not)
In this UNC example \\mis1\myresources, "mis1" is the name of the network share that is located on the the server named "myresources". False True
False
It is considered that Ethernet was invented in 1980.
False
Layer 4 of the OSI model is called the network layer.
False
Layer 4 of the OSI model is called the session layer.
False
On a client/server network, all computers are equal to each other.
False
On any computer, only 100 communication sessions can be established as needed.
False
Subnetting is the process of sending data from one computer to another across a network.
False
The Ethernet network access protocol CSMA/CD stands for Carrier Sending Multiple Access/Collision Detection.
False
The Ethernet network access protocol CSMA/CD stands for Carrier Sending Multiple Access/Collision Detection. True False
False
The IP protocol contains a source physical address and a destination physical address.
False
The IPv4 protocol header contains a sender's physical address and a receiver's physical address.
False
The IPv6 protocol header has 40 binary bits.
False
The IPv6 protocol header is 20 byte long.
False
The acronym LAN stands for Long-distance Area Network.
False
The most popular network topology used in local area networks (LAN) is the ring topology.
False
The physical address is defined at layer 3 of the OSI model.
False
The physical address is defined at the transport layer of the OSI model.
False
The port numbers are defined and used at the network layer of the OSI model.
False
The role of a physical address is to uniquely determine a destination network on which a device is located.
False
The standard IP protocol header size is 20 bits.
False
There are only 16 communication sessions that can be established on a computer, .
False
UDP protocol uses a three-way handshake procedure to verify and establish connectivity.
False
UTP cables are widely used on modern computer networks. The acroynm UTP stands for Untwisted Transmission Pairs.
False
Zoom video service is an example of PaaS.
False
The standard UDP header has 160 bits.
False 32
The OSI Model has four layers, while the TCP/IP Model has seven layers.
False (The OSI Model has seven layers, and the TCP/IP Model has four layers.)
A router is an OSI layer 4 device
False Correct answer: layer 3
A router is a type of networking device that is typically used to connect client devices or desktop computers to a network.
False Switches are used to connect devices to a network
At layer 2 of the OSI model, the network to network data communications or the routing is handled.
False Transport Layer
New categories of UTP cables are widely used on modern computer networks. The acronym UTP stands for Untwisted Transmission Pairs.
False unshielded twisted pair
The Ethernet network access protocol CSMA/CD stands for Carrier Sending Multiple Access/Collision Detection.
False - Carrier Sensing Multiple Access with Collision Detection
A computer's MAC or physical address is defined at layer 3 of the OSI model.
False - Defined at the Link Layer (layer 2)
The Internet Protocol is defined at the transport layer of the TCP/IP network model.
False - the internet layer
UTP cables are widely used on modern computer networks. The acroynm UTP stands for Untwisted Transmission Pairs. True False
False Unshielded Twisted Pair
A computer's MAC or physical address is defined at layer 3 of the OSI model.
False, layer 2, The Data Link Layer
Which of the following types of cables relies on pulses of laser light to carry data?
Fiber optic
OSI Network Layer
Handles addressing of network nodes/users(by IP) and the routing data between them. THE INTERNET
UDP
User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism. NOT TRACKABLE
Windows 10 or 8 OS professional or enterprise editions are designed as server operating systems. a. True b. False
b. False
Which of the following cloud services can NOT be configured? a. PaaS b. SaaS c. IaaS d. Private cloud
b. SaaS
Which of the following commands can be used to view the communication sessions on a Windows computer?
netstat
MAC address is also called
physical address Built into computer
Which of the following commands can be used to check end to end connectivity?
ping
To rename a client computer, you must have
the local administrator's right
What is the data rate of the current state of art IEEE 802.11ac standard (wave 1)?
up to 1.3 Gbps
Which range of TCP or UDP port numbers are typically used on client computers?
dynamic ports
In the above picture, the physical network topology is
Star
In the enclosed picture, the network topology is
Star
In this picture, the network topology is
Star
Which of the following protocols is not a routing protocol? RIP OSPF TCP
TCP
Which of the following protocols is not a routing protocol?
TCP Correct answers: RTVS, VOIP, HTTP; HTTPS ,RTRS, RDP, SMTP, POP3, FTP, SMB, MIME
Which of the following commands can be used to view a Windows computer's physical and logical address in the same time?
ipconfig /all
The root directory of the entire file system hierarchy of a Linux OS is represented by: . (a dot) ~ / \
/
Which range of TCP or UDP port numbers are reserved for servers?
0-1023
What is the range of decimal values that can be represented by 8 binary bits?
0-255
Given a class A IPv4 address, what is the range of binary bits that can be borrowed from the host portion to create subnets?
1-22
To transmit 1 Giga bits of data using a device that has a data transmission rate of 100Mbps, how long will it take?
10 seconds
Convert this hex number to a binary number: ABCD. Which of the following is the right answer?
1010101111001101
Which of the following IP addresses is NOT in one of the reserved private IP address ranges?
11.80.25.1
Every MAC address has how many hex digits?
12
If 12 binary bits are borrowed from the host portion of a class A IPv4 address, how many bits are left for the host IDs for each subnet?
12
What is the subnet network ID for the following CIDR IP address: 120.80.168.1 /16?
120.80
Based on the classful IPv4 addressing system, how many class A networks are available?
126
Based on the classful IPv4 addressing system, how many valid class A networks are available?
126
Class B Address Range
128-191
Given an IP address 129.65.192.224 with a subnet mask 255.255.128.0. If we want to represent it using the CIDR notation, what will it be?
129.65.192.224/17
Refer to the following physical address: 18-03-73-14-F5-50 What is the portion that is assigned by the vendor or manufacturer? 18-03-73 18-03-73-14-F5-50 14-F5-50 Can not decide
14-F5-50
On the physical address highlighted, what is the portion that is assigned by the manufacturer? 18-03-73-14-F5-50
14-F5-50 Vender = first three Factory Assigned = Last three
In the IPv4 addressing system, how many class B network ID's are possible? (You may use the MS-Windows Calculator.)
16384
In the original IPv4 addressing system, how many class B network ID's are possible? (You may use the MS-Windows or your Calculator.)
16384
A book has 550 pages. Assume each page has 50 lines, and each line has 85 characters. If we convert this book into a digital document with no overhead, what is the amount of data generated?
18.7 Million bits
A book has 550 pages. Assume each page has 50 lines, and each line has 85 characters. If we convert this book into a digital document with no overhead, what is the amout of data generated?
18.7 Million bits
Class C Address Range
192-223
Deploying a firewall to protect an entire enterprise network is called domain-level security. True False
False
A global unicast IPv6 address normally begins with a hex digit of _______.
2 3
Each IPv6 address has 128 hexadecimal digits.
False
What radio frequency does an IEEE 802.11g network use?
2.4 GHz
A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be simplified using just the zero compression approach?
2001::9e76:04c9:009b:3f57:0e98
A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be written using the zero compression approach?
2001::9e76:04c9:009b:3f57:0e98
A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:0000:0e98. How can this address be simplified using both the dropping leading zeros and zero compression methods?
2001::9e76:4c9:9b:0:e98
A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be written using both the dropping leading zeros and zero compression methods?
2001::9e76:4c9:9b:3f57:e98
A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be written using the dropping leading zeros and zero compression shorthand approaches?
2001::9e76:4c9:9b:3f57:e98
Based on the IPv4 addressing system, how many binary bits are allocated to the host ID portion of a class A network?
24
Based on the original IPv4 addressing system, how many binary bits are allocated to the host ID portion of a class A network?
24
Suppose a IPv4 network has 16 bits in its host ID. What will be the subnet mask for this network?
255.255.0.0
What is the subnet mask of the following CIDR IP address: 38.168.1.5 /16?
255.255.0.0
What is the subnet mask of the following IP address: 138.168.1.5 /16?
255.255.0.0
What is the subnet mask of the following IP address: 192.168.1.5 /16?
255.255.0.0 (The /16 in the IP address is CIDR notation indicating how many bits are a 1 in the subnet mask. The subnet mask is 255.255.0.0.)
Which of the following is NOT a valid IP address?
256.10.1.100
192.168.43.0/26
26 Bits in Network ID, Subnet Mask is last divider and bit length. Host is rest
How many groups of zeros have been compressed in the following IPv6 address: fe80::3242:0:0:a8a1
3
Convert the following IPv6 address from binary to a simplified HN format: 00111111111011111110110111001101111101000110111101110100110001010000000000000000000000000000000000000000000000000000000000000000
3fef:edcd:f46f:74c5::
You are working on a computer and see that it has an IPv6 address of 2001:0001::41f0:f763. How many groups of 0s have been omitted?
4
You are working on a computer and see that it has an IPv6 address of 2001::41f0:f763:52f6. How many groups of 0s have been compressed?
4
Which of the following WKP port number is typically used on secure Web servers?
443 (DNS uses port 53. SMTP uses port 25. HTTP uses port 80. Secure LDAP uses port 636.)
A full mesh network has 10 nodes, What are the total links required to have all 10 nodes connected to each other?
45
Bits in a MAC address
48 bits
In the screen shot above, for the highlighted line, what is the TCP port number used on the local computer?
49514
What radio frequency band is used in IEEE 802.11ac standard?
5 GHz
What radio frequency is the upcoming IEEE 802.11ac Wave 2 standard going to use?
5 GHz
If we want to set up a firewall to block DNS traffic, then which port should be used?
53
The preamber field used in Ethernet frame has how many binary bits?
56
The preamber field used in Ethernet frame has how many binary bits? 7 56 48 1500
56
What is the standard size (in binary bits) of the UDP protocol?
64
Suppose we have a class B network. What is the maximum of unique host IDs that can be assigned to computers on this network?
65534
How many TCP or UDP port numbers are possible?
65536
In total, how many TCP or UDP port numbers are available?
65536
An IP address in CIDR notation is 66.16.76.25/18. The equivalent subnet mask is 255.255.0.0.
False
Based on the original IPv4 addressing system design, how many binary bits are allocated to the host ID portion of a class C IP address?
8
Given a class B IPv4 address, if we want to create 138 subnets, how many binary bits need to be borrowed from the host portion?
8
Given the following IP address with its subnet mask. How many bits are in the host ID portion: 198.120.150.166, subnet mask 255.255.255.0
8
Given the following IP address with its subnet mask. How many bits are in the host ID portion: 199.120.150.166, subnet mask 255.255.255.0
8
IPv6
8 Groups of Hex, 128 Bits
An NAT device can only convert private IP addresses to public IP addresses. True False
False
If we store 10 symbols or characters in a Notepad file, what will be the size of this file in binary bits?
80
In the screen shot above, for the highlighted line, what is the TCP port number used on the remote computer?
80
In the screen shot above, for the highlighted line, what is the TCP port number used on the remote server?
80
WKP Internet Port?
80
Which of the following WKP port number is used for Web servers?
80
Which of the following WKP port number is typically used on Web servers?
80 (DNS uses port 53. SMTP uses port 25. HTTP uses port 80. Secure LDAP uses port 636.)
Which of the following WKP port number is typically used on non-secure Web servers?
80 (DNS uses port 53. SMTP uses port 25. HTTP uses port 80. Secure LDAP uses port 636.)
The latest development in Wi-Fi standard is 802.11n 802.11ad 802.11ac 802.11g
802.11ad
Wi-Fi 6 refers to which one of the following IEEE standard?
802.11ax
Based on the IPv4 addressing system, only 16384 Host IDs are possible for each class B network.
False
Based on the screen shot, we can say for sure that the server is not available.
False
What is the top data rate specified in IEEE 802.11ax standard?
9.6 Gbps
Map the following IPv4 address into an IPv6 address using the dual IP stack approach: 137.129.8.2
::FFFF: 8981:0802
Which of the followings refers to host security?
A proxy server is used. A firewall device is installed on the edge of a network. Correct Response Enable automatic update on a client computer. Create a security or DMZ zone on a network.
Microsoft Windows firewall supports 3 types of location profiles or settings. Which one of the followings is NOT one of them?
Airport Does Support: Home, Public places, Domain
SMTP operates on which layer of the Internet Model?
Application
When a server on a network sends a message to all computers or devices on the network, which type of data transmission is this?
Broadcast
Which class is the following classful IP address? 12.17.5.3
Class A
Which one of the following commands allows us to view the domain policies applied on a domain computer?
C:\>gpresult /r
Which of the following is the media access protocol used on wireless Ethernet networks?
CSMA/CA
Which of the following is the media access protocol used on wireless Ethernet networks? CSMA/CD CSMA/CA TCP Token passing
CSMA/CA
Which of the following is the media access protocol used on wireless Ethernet networks?
CSMA/CA Carrier sense multiple access with collision avoidance
OSI Transport Layer
Concerns the reliability of data transfer between systems.
A wireless access point (WAP) device used on a SOHO network typically supports many roles. What are these roles?
DHCP firewall Router
Based on the screen shot of a computer's system property, this computer is in which networking mode?
Domain-based (see q-1 quiz 7 lecture picture)
Cent OS is a proprietary client OS.
False
Which of the followings is a way to enhance client security? A proxy server is used. A firewall device is installed on the edge of a network. Enable automatic update on a client computer. Create a security or DMZ zone on a network.
Enable automatic update on a client computer.
How does the internet connect to a device
Every device needs a unique physical address
A client OS is generally designed for a multi-user environment.
False
A client/server network must be a domain based network.
False
A computer's MAC or physical address is defined at layer 3 of the OSI model.
False
A computer's MAC or physical address is defined at layer 3 of the OSI model. False True
False
A computer's physical address is defined at the physical layer of the OSI model.
False
A computer's physical address is used to determine on which network or subnet the computer is located.
False
A data string 110010010 is received which contains 1 odd parity bit at the end of the string. Based on the algorithm learned in class, we can say no transmission error has occurred.
False
A data string 110010010 which contains 1 odd parity bit is received. Based on the algorithm learned in class, we can say no transmission error has occurred.
False
A network-based or hardware based firewall cannot be used to protect an entire network.
False
A router is a type of networking device that is typically used to connect client devices or desktop computers to a network. True False
False
A router is an OSI layer 4 device. True False
False
Subnet Mask
Formatting of IP address to create more networks and customize host connections.
The transmission mode where data can travel back and forth simultaneously is called:
Full Duplex
In the enclosed picture, the network topology is
Full Mesh
In the following picture, the network topology is
Full Mesh
The picture below describes which type of transmission mode in terms of data flow directions?
Full-duplex (b/c 2 directions and simultaneous flow)
In the above picture, the physical network topology is
Hierarchical
HTTP
Hypertext Transfer Protocol
The wireless Ethernet family of standards altogether is often called as
IEEE 802.11x
The wireless Ethernet family of standards altogether is called as
IEEE 802.11x Original Ethernet Fast Ethernet Gigabyte Ethernet 10 Gigabyte Ethernet
Which of the following standards supports a data rate at 1000Mbps? IEEE 802.3ab IEEE802.3u IEEE 802.3ae IEEE 802.3
IEEE 802.3ab
Which of the following standards supports a data rate at 1000Mbps?
IEEE 802.3ab FastEthernet: 100Mbps standards: 802.3u Gigabit Ethernet: 1000-Mbps standards: 802.3z (fiber) and 802.3ab (CAT5e or above) 10 Gigabit Ethernet: 802.3ae - fiber 802.3an
The official FastEthernet standard is called
IEEE 802.3u
The official FastEthernet standard is called IEEE 802.3 IEEE 802.3z IEEE 802.3ab IEEE 802.3u
IEEE 802.3u
The official FastEthernet standard specification is called
IEEE 802.3u
Which of the following protocols is not an Application Layer protocol?
IP
Based on the screen shot above from a computer, what is this computer's FQDN:
IS-DC01.ISNET.UWEC.EDU FQDN: fully qualified domain name
Linode offers cloud service at which service level?
IaaS
Linode offers cloud service at which service level? IaaS PaaS SaaS On-demand service
IaaS
In the TCP/IP network model, which layer is responsible for routing IP packets to their destinations?
Internet
A group of computers are connected in a single location such as in a room or on a floor of a building. What is this type of network called?
LAN
A network is located in a single location such as in a room or on a floor of a building. What is this type of network called?
LAN
The TCP/IP protocol suite is a collection of protocols defined at multiple layers of the TCP/IP network model. Which of the following is not one of those layers?
Link Correct: Internet, Transport, Application
Subnet Equation
Log(x)/Log2
In the above picture, the physical network topology is
Mesh
What is the collection of Microsoft's cloud computing offerings generally called?
Microsoft Azure
Which one of the following is Microsoft's major cloud computing technology?
Microsoft Azure
Which one of the follwoings is Microsoft's major cloud computing technology? Microsoft Servers Operating Systems Microsoft Office 365 Microsoft Azure Microsoft Windows 10 Operating Systems
Microsoft Azure
Which of the following allows a web site to be created on a computer?
Microsoft Internet Information Services
Which of the followings is NOT a cloud computing service delivery model?
Microsoft Office 365
Which of the followings is NOT a cloud computing service model? SaaS IaaS Microsoft Office 365 PaaS
Microsoft Office 365
Which of the followings is an example of Software as a service (SaaS)? An OS installed on a VM in cloud A web site created in a CentOS server Microsoft Office 365 Apache server installed in a CentOS virtual machine
Microsoft Office 365
Whihc of the followings is an example of Software as a service (SaaS)?
Microsoft Office 365
OSI Presentation Layer
OSI model protocol responsible for "managing and translating the information into an understandable format that the Application layer can process further. Many "Application-layer" protocols function at the Presentation layer too, taking datagrams and segments and turning them into formats programs can use".
OSI Physical Layer
OSI model protocol responsible for defining the electrical signals that travel the network cables and connectors
OSI Data Link Layer
OSI model protocol responsible for making the rules for gathering and completing all the elements that make up a data frame and putting the whole thing together so that it can be passed to a Physical-layer device and on to the network?
What defines the agreements, standards or rules that computers and other devices use to communicate with each other on networks?
Protocols
Which of the followings is a type of routing protocol that determines the optimal routing path based on the number of hops in a route between a source and destination computer?
RIP
Which of the followings is a type of routing protocol that determines the optimal routing path based on the number of hops in a route between a source and destination computer? RIP OSPF IP DHCP
RIP
When you send an email, which of the following application layer protocols will be used?
SMTP
Which of the following cloud services can NOT be configured? PaaS SaaS IaaS Private cloud
SaaS
SMTP
Simple Mail Transfer Protocol
On the screen above, what is the computer's logical address?
The logical address is also the IPv4 address
OSI Application Layer
The seventh layer of the OSI Model which provides services directly to the user and allows the user to use the network
TCP is a transport layer protocol. The acronym TCP stands for
Transmission Control Protocol
TCP
Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
172.16.10.120 is a private class B IP address.
True
A Windows domain is created on servers called domain controllers.
True
A cloud service typically has a monthly allowance on the amount of traffic included in the monthly cost. True False
True
A data transmission rate of 100Mbps means 100,000,000 bits of data can be transmitted in one second.
True
A data transmission rate of 100Mbps means 100,000,000 bits of data can be transmitted per second.
True
A motivation of developing the IPv6 addressing is because of the smaller addressing space offered by IPv4 addressing system.
True
A routing protocol is essentially an implementation of a mathmatical algorithm to determine the best path between two end points.
True
A switch operates at layer 2 of the OSI model. True False
True
A top of the line WiFi 6 router is often a tri band device.
True
A workgroup-based network has inherent weakness in security management, bacause it relies on individual users to mange each computer on the network.
True
After a Windows domain has been created, a user must be centrally authenticated in order to log on to the domain.
True
After a client computer has joined to a domain, it can be centrally controlled by domain controllers.
True
Each IPv6 address consists of two components: the network ID and the host ID which is also called extended unique identifier (EUI).
True!
Which of the followings is NOT an example of Software as a service (SaaS)?
Virtual Machines created in Microsoft Azure
Which of the followings is not a client OS?
Windows Server 2019
Based on the screen shot above from a computer, we can say this computer is a:
a server (background services instead of programs)
Which class is the following classful IP address? 126.17.5.3 a. Class A b. Class B c. Class C d. Class D
a. Class A
Which of the following Ethernet standards supports a data rate at 1000Mbps? a. IEEE 802.3ab b. IEEE802.3u c. IEEE 802.3ae d. IEEE 802.3
a. IEEE 802.3ab
Linode offers cloud service at which service level? a. IaaS b. PaaS c. SaaS d. On-demand service
a. IaaS
Which of the followings is a type of routing protocol that determines the optimal routing path based on the number of hops used in a route? a. RIP b. OSPF c. IP d. DHCP
a. RIP
A switch operates at layer 2 of the OSI model. a. True b. False
a. True
After a Windows domain has been created, if a user wants to log on to the domain, then a domain user account must be used. a. True b. False
a. True
An essential characteristic of cloud service is the cloud computing cost can be measured. a. True b. False
a. True
Each Ethernet frame contains a sender's physical address and a receiver's physical address. a. True b. False
a. True
Each switch has a bridge table that maps the switch's physical ports to connected computers' physical addresses. a. True b. False
a. True
Each type of data communication application needs to be supported by a specific application layer protocol. a. True b. False
a. True
IEEE 802.11ac Wave 2 standard supports only 5GHz frequency band. a. True b. False
a. True
IaaS allows ultimate flexibility in cloud service configurations. a. True b. False
a. True
If data needs to be transmitted from one subnet to another, a router or a gateway will need to be used. a. True b. False
a. True
Microsoft Windows desktop client operating systems are generally designed for two scenarios: home users and business users. a. True b. False
a. True
The IEEE 802.11 committe was created to define wireless Ethernet networking standards. a. True b. False
a. True
The data carried with UDP protocol can not be traced. a. True b. False
a. True
The hexadecimal value of the decimal number 400,000 is 61A80. a. True b. False
a. True
The location of a cloud server is a factor to consider when we choose a cloud server to use. a. True b. False
a. True
The minimum Ethernet frame size is 72 bytes. a. True b. False
a. True
The notation IEEE 802.11x generally refers to all wireless Ethernet standards. a. True b. False
a. True
To manage a large number of client computers effectively, they can be put in a Windows domain. a. True b. False
a. True
Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or OUI? a. 00-0C-29-E5-84-25 b. 00-0C-29 c. E5-84-25 d. Can not decide
b. 00-0C-29
What is the subnet ID (in binary format) for the subnet to which the following IP address belongs? 100.75.125.200/11 a. 111 b. 010 c. 1011 d. 000
b. 010
The preamber field used in Ethernet frame has how many binary bits? a. 7 b. 56 c. 48 d. 1500
b. 56
Suppose we have a class B network. How many computers with unique host IDs can be put on this network? a. 254 b. 65534 c. 16,777,214 d. 256
b. 65534
Based on the original IPv4 addressing system design, how many binary bits are allocated to the host ID portion of a class C IP address? a. 24 b. 8 c. 16 d. 32
b. 8
Wi-Fi 6 refers to which one of the following IEEE standard? a. 802.11n b. 802.11ax c. 802.11ac d. 802.11g
b. 802.11ax
Which of the following is the media access protocol used on wireless Ethernet networks? a. CSMA/CD b. CSMA/CA c. TCP d. Token passing
b. CSMA/CA
A computer's MAC or physical address is defined at layer 3 of the OSI model. a. True b. False
b. False
A computer's physical address is used to determine on which network or subnet the computer is located. a. True b. False
b. False
A data string 110010010 which contains 1 odd parity bit is received. Based on the algorithm learned in class, we can say no transmission error has occurred. a. True b. False
b. False
A router is a type of networking device that is typically used to connect client devices or desktop computers to a network. a. True b. False
b. False
A router is an OSI layer 4 device. a. True b. False
b. False
A router routes data based on physical addresses. a. True b. False
b. False
A switch transmits data based on a computer's IPv4 address. a. True b. False
b. False
An IP address in CIDR notation is 66.16.76.25/18. The equivalent subnet mask is 255.255.0.0. a. True b. False
b. False
Each IPv6 address has 128 hexadecimal digits. a. True b. False
b. False
The Ethernet network access protocol CSMA/CD stands for Carrier Sending Multiple Access/Collision Detection. a. True b. False
b. False
To refer a GigabitEthernet type of port on a switch, we prefix it with a letter E and then the port number. a. True b. False
b. False
UDP protocol provides guaranteed delivery of data. a. True b. False
b. False
UTP cables are widely used on modern computer networks. The acroynm UTP stands for Untwisted Transmission Pairs. a. True b. False
b. False
When a server on a network sends a message to all computers or devices on the network, which type of data casting is used?
broadcast
The root directory of the entire file system hierarchy of Cent OS is represented by: a. . (a dot) b. ~ c. / d. \
c. /
Refer to the picture above. On the physical address highlighted, what is the portion that is assigned by the vendor or manufacturer? a. 18-03-73 b. 18-03-73-14-F5-50 c. 14-F5-50 d. Can not decide
c. 14-F5-50
Suppose a IPv4 network has 22 bits in its host ID portion. What will be the subnet mask for this network? a. 255.255.224.0 b. 255.255.255.0 c. 255.192.0.0 d. 255.248.0.0
c. 255.192.0.0
How many TCP or UDP port numbers are possible? a. 3389 b. 80 c. 65536 d. 1024
c. 65536
Which of the following WKP port number is typically used on Web servers? a. 25 b. 53 c. 80 d. 636
c. 80
Which of the following protocols is not an Application Layer protocol? a. SMTP b. POP3 c. IP d. FTP
c. IP
What is Microsoft's cloud computing technology offering called? a. Microsoft Servers Operating Systems b. Microsoft Office 365 c. Microsoft Azure d. Microsoft Windows 10 Operating Systems
c. Microsoft Azure
Which of the followings is NOT a cloud computing service model? a. SaaS b. IaaS c. Microsoft Office 365 d. PaaS
c. Microsoft Office 365
Which of the followings is an example of Software as a service (SaaS)? a. An OS installed on a VM in cloud b. A web site created in a CentOS server c. Microsoft Office 365 d. Apache server installed in a CentOS virtual machine
c. Microsoft Office 365
Which of the following protocols is not a routing protocol? a. RIP b. OSPF c. TCP
c. TCP
Given a class A IPv4 address, what is the range of binary bits that can be borrowed from the host portion to create subnets? a. 1-8 b. 1-16 c. 1-24 d. 1-22
d. 1-22
A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be shorthanded using the zero compression approach? a. 21:0000:0000:9e76:04c9:009b:3f57:0e98 b. 2001:0000:0000:9e76:4c9:9b:3f57:e98 c. 2001:0000:9e76:04c9:009b:3f57:0e98 d. 2001::9e76:04c9:009b:3f57:0e98
d. 2001::9e76:04c9:009b:3f57:0e98
A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:0000:0e98. How can this address be shorthanded using both the dropping leading zeros and zero compression methods? a. 21:0000:0000:9e76:04c9:009b::0e98 b. 2001:::9e76:04c9:009b:0000:0e98 c. 2001::9e76:4c9:9b::e98 d. 2001::9e76:4c9:9b:0000:e98
d. 2001::9e76:4c9:9b:0000:e98
Given a class B IPv4 address, if we want to create 138 subnets, how many binary bits need to be borrowed from the host portion? a. 5 b. 6 c. 7 d. 8
d. 8
If 15 binary bits are borrowed from the host portion of a class A IPv4 address, how many bits are left for the host IDs for each subnet? a. 17 b. 7 c. 12 d. 9
d. 9
The official FastEthernet standard is called a. IEEE 802.3 b. IEEE 802.3z c. IEEE 802.3ab d. IEEE 802.3u
d. IEEE 802.3u
When you send an email, which of the following application layer protocols will be used? a. SNMP b. POP c. HTTP d. SMTP
d. SMTP
Based on the screen shot above from a computer, we can say this computer is a a. client computer b. a tablet c. a smartphone d. a server
d. a server
Which of the following allows a web server to be created on a CentOS server? a. yum update b. run Internet Explorer c. install Internet Information Services d. yum install httpd
d. yum install httpd
The name of the data unit at layer 2 of the OSI model is called ____.
frame
The preamble filed used in Ethernet frame is to ____.
get the attention of the receiver synchronize the sender and the receiver let other devices know that a device is going to send data to the network
A computer's logical address is used to determine on which network or subnet the computer is located
true!
A motivation of developing the IPv6 addressing is because of the smaller addressing space offered by IPv4 addressing system.
true!
Each IPv6 address has 32 hexadecimal digits
true!
Which of the following allows a web site to be created on a CentOS server? yum update run Internet Explorer install Internet Information Services yum install httpd
yum install httpd