Networking Final Part 5
Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)
-POP -DNS
What are two characteristics of IP? (Choose two.)
-does not require a dedicated end-to-end connection -operates independently of the network media
What are two common causes of signal degradation when using UTP cabling? (Choose two.)
-improper termination -low-quality cable or connectors
What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)
-message size -message encoding -delivery options
An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario? (Choose three.)
-security -quality of service -fault tolerance
Which scenario describes a function provided by the transport layer?
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window
Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?
Layer 2 destination address = 00-00-0c-94-36-ab Layer 2 source address = 00-00-0c-94-36-bb Layer 3 destination address = 172.16.20.200 Layer 3 source address = 172.16.10.200
Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
The administrator must first enter privileged EXEC mode before issuing the command
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?
authorization
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases