Fundamentals of Data Communications Mid-Term
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used? 10.0.0.0 10.1.100.0 10.1.0.0 10.1.100.32
10.1.0.0
How does BYOD change the way in which businesses implement networks? BYOD requires organizations to purchase laptops rather than desktops. BYOD devices are more expensive than devices that are purchased by an organization. BYOD provides flexibility in where and how users can access network resources. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
BYOD provides flexibility in where and how users can access network resources.
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? Ethernet, TCP, IP, HTTP HTTP, IP, TCP, Ethernet Ethernet, IP, TCP, HTTP HTTP, TCP, IP, Ethernet
HTTP, TCP, IP, Ethernet
Which statement is true about the running configuration file in a Cisco IOS device? It should be deleted using the erase running-config command. It is stored in NVRAM. It affects the operation of the device immediately when modified. It is automatically saved when the router reboots.
It affects the operation of the device immediately when modified.
What is the function of the shell in an OS? It provides the intrusion protection services for the device. It interfaces between the users and the kernel. It provides dedicated firewall services. It interacts with the device hardware
It interfaces between the users and the kernel.
What is an ISP? It is a networking device that combines the functionality of several different networking devices in one. It is a protocol that establishes how computers within a local network communicate. It is an organization that enables individuals and businesses to connect to the Internet. It is a standards body that develops cabling and wiring standards for networking.
It is an organization that enables individuals and businesses to connect to the Internet.
What is done to an IP packet before it is transmitted over the physical medium? It is tagged with information guaranteeing reliable delivery. It is encapsulated in a Layer 2 frame. It is segmented into smaller individual pieces. It is encapsulated into a TCP segment.
It is encapsulated in a Layer 2 frame.
What is the Internet? It provides connections through interconnected global networks. It provides network access for mobile devices. It is a network based on Ethernet technology. It is a private network for an organization with LAN and WAN connections.
It provides connections through interconnected global networks.
Which memory location on a Cisco router or switch stores the startup configuration file? flash ROM NVRAM RAM
NVRAM
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? Reload the device and type yes when prompted to save the configuration. Copy the information in the startup configuration file to the running configuration. Copy the running configuration to the startup configuration file. Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
Which memory location on a Cisco router or switch will lose all content when the device is restarted? NVRAM flash ROM RAM
RAM
What is the default SVI on a Cisco switch? VLAN99 VLAN1 VLAN999 VLAN100
VLAN1
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network? BYOD IPS ACL VPN
VPN
In which scenario would the use of a WISP be recommended? an Internet cafe in a city an apartment in a building with cable access to the Internet a farm in a rural area without wired broadband access any home with multiple wireless devices
a farm in a rural area without wired broadband access
Which device performs the function of determining the path that messages should take through internetworks? a DSL modem a firewall a router a web server
a router
Which functionality is provided by DHCP? automatic assignment of an IP address to each host remote switch management translation of IP addresses to domain names end-to-end connectivity test
automatic assignment of an IP address to each host
A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe? bring your own device online collaboration cloud computing video conferencing
bring your own device
What type of communication will send a message to all devices on a local area network? allcast unicast multicast broadcast
broadcast
Which message delivery option is used when all devices need to receive the same message simultaneously? broadcast unicast multicast duplex
broadcast
What process is used to receive transmitted data and convert it into a readable message? decoding encapsulation access control flow control
decoding
Which logical address is used for delivery of data to a remote network? source MAC address destination MAC address source IP address destination IP address destination port number
destination IP address
What process is used to place one message inside another message for transfer from the source to the destination? decoding encapsulation access control flow control
encapsulation
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? Internet extranet intranet extendednet
extranet
Which type of communication will send a message to a group of host destinations simultaneously? broadcast unicast anycast multicast
multicast
Which type of access is secured on a Cisco router or switch with the enable secret command? privileged EXEC console line virtual terminal AUX port
privileged EXEC
What is the general term that is used to describe a piece of data at any layer of a networking model? segment packet protocol data unit frame
protocol data unit
What is the purpose of protocols in data communications? specifying the bandwidth of the channel or medium for each type of communication specifying the device operating systems that will support the communication providing the rules required for a specific type of communication to occur dictating the content of the message sent during communication
providing the rules required for a specific type of communication to occur
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users? quality of service scalability reliability accessibility
scalability
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? zero-day attack DoS attack spyware identity theft
spyware
What type of network must a home user access in order to do online shopping? the Internet a local area network an intranet an extranet
the Internet
In computer communication, what is the purpose of message encoding? to convert information to the appropriate form for transmission to break large messages into smaller frames to negotiate correct timing for successful communication to interpret information
to convert information to the appropriate form for transmission
Why would a technician enter the command copy startup-config running-config? to copy an existing configuration into RAM to save an active configuration to NVRAM to remove all configurations from the switch to make a changed configuration the new startup configuration
to copy an existing configuration into RAM
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices? transport presentation network session application
transport
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display? setup mode global configuration mode user EXEC mode privileged EXEC mode
user EXEC mode