IS 345 Final, IS345 Quiz 9, IS 345 combo

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

After a client computer has joined to a domain, it can be centrally controlled by domain controllers. True False

True

All devices in a bus topology network are connected to a common cable segment.

True

An enterprise network security involves the use of network firewalls, perimeter networks or security zones.

True

An important function of a computer operating system is to provide an interface to access the computer's hardware.

True

Apple's iPhone operating system (iOS) is an example of a mobile operating system.

True

At layer 3 of the OSI model, the network to network data communication or the routing path is handled.

True

By default, Windows 10 OS is installed initially in a peer to peer networking mode.

True

Comparing with Microsoft Word, Notepad is a no overhead text editor.

True

Each Ethernet frame contains a sender's physical address and a receiver's physical address.

True

Each Ethernet frame contains a sender's physical address and a receiver's physical address. True False

True

Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or OUI?

00-0C-29

Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or the vendor's OUI? 00-0C-29-E5-84-25 00-0C-29 E5-84-25 Can not decide

00-0C-29

Each IPv6 address consists of two basic components: the network ID and the host ID. Host ID is also called extended unique identifier (EUI).

True

Each IPv6 address has 32 hexadecimal digits.

True

Each IPv6 address has a 2-components basic structure: the global routing index and the extended unique identifier (EUI).

True

Each IPv6 protocol header is 320 bits long fixed.

True

Each type of data communication application needs to be supported by a specific application layer protocol.

True

Each type of network based application needs to be supported by a corresponding application layer protocol.

True

Given an original IPv4 address 166.16.76.25, its default subnet mask is 255.255.0.0

True

Given the following IP address with its subnet mask. The network ID is: 158.20.50.66, subnet mask 255.255.0.0

True

HTTPS is an application layer protocol.

True

IEEE 802.11ac Wave 2 standard supports only 5GHz frequency band. True False

True

IEEE 802.11ax standard is backward compatible to 802.11a, 802.11b, and 802.11g networks.

True

IPv6 Global Unicast Address allows data to be sent across the Internet.

True

IPv6 address system allows for more efficient routing than IPv4.

True

IaaS allows ultimate flexibility in cloud service configurations.

True

IaaS allows ultimate flexibility in cloud service configurations. True False

True

If data needs to be transmitted from one subnet to another, a router and a default gateway will need to be used.

True

If data needs to be transmitted from one subnet to another, a router and a default gateway will need to be used. True False

True

In IPv6 protocol, there is no field designed for error checking.

True

Microsoft Windows firewall is a software program that can be configured to block incoming or outgoing data traffic based on TCP port numbers.

True

Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or the vendor's OUI?

00-0C-29 Vender = first three Factory Assigned = Last three

Refer to the above picture. What is the computer's physical address?

00-0C-29-E5-84-25

Refer to the attached picture. What is the computer's physical address?

00-0C-29-E5-84-25

An example of a physical address is ____.

00-C0-F0-27-64-E2

An example of a MAC address is ____.

00-C0-F0-27-64-E2 (Must be 12 hexadecimal digits long)

What is the subnet ID (in binary format) for the subnet to which the following IP address belongs? 100.75.125.200/11

010

Class A Address Range

1.0.0.0 - 126.0.0.0

What is the Host ID in the following CIDR IP address: 198.88.16.10/24?

10

Microsoft Windows firewall is a software program that can be configured to block incoming or outgoing data traffic based on TCP port numbers. True False

True

On a domain-based Widnows network, a client computer is identified by its FQDN.

True

On a domain-based client/server network, a client computer's desktop settings can be centrally controlled by the domain controller servers.

True

Putty program allows a remote connection to a Linux-based cloud server to be established.

True

TCP provides guaranteed delivery of data.

True

The 10 Gigabit Ethernet standard that can be implemented on MMF or SMF is called IEEE 802.3ae.

True

The IEEE 802.11 committe was created to define wireless Ethernet networking standards. True False

True

The Internet layer in the TCP/IP model is equivalent to the Network layer in the OSI model.

True

The TCP/IP networking model is also called the Internet networking model.

True

The Windows 10 operating system is designed and optimized to be a client OS.

True

The acronym MAN stands for Metropolitan Area Network.

True

The acronym WAN stands for Wide Area Network.

True

The data carried by UDP protocol can not be tracked.

True

The data carried with TCP protocol can be reliably transmitted.

True

The dual stack approach allows the coexistence of IPv4 and IPv6 addresses.

True

The hexadecimal notation format is used in IPv6 addressing system.

True

The hexadecimal value of the decimal number 400,000 is 61A80.

True

The location of a cloud server is a factor to consider when we choose a cloud server to use. True False

True

The logical address is used to determine on which network or subnet a computer is located.

True

The logoical network topology defines how data is transmittd in a network.

True

The minimum Ethernet frame size is 72 bytes.

True

The minimum Ethernet frame size is 72 bytes. True False

True

The original classful IPv4 addressing system has evolved into the current CIDR system.

True

The password "Summer2023" is a complex password but not a strong password.

True

The password "iS345$589" is a strong password. True False

True

There are no classes used in IPv6 addressing system.

True

To manage a large number of client computers effectively, a Windows domain can be created.

True

To manage a large number of client computers effectively, they can be put in a Windows domain which is created on servers called domain controllers. True False

True

To protect an enterprise network, we can consider using firewalls, perimeter networks or security zones. True False

True

To view IP address configurations on a Linux computer, we use the command ifconfig.

True

UDP is a transport layer protocol.

True

UDP is usually used to carry network status data from sender to receiver.

True

Using Windows advanced firewall, any TCP or UDP port can be blocked. True False

True

Wireless Ethernet uses the same frame format as its wired counterpart.

True

The password "iS345$589" is a strong password.

True Characteristics of a strong password: At least 6 characters long, Uppercase and lowercase letters, has at least one symbol character in the 2nd through 6th positions

Each wireless Ethernet network can be identified by its SSID.

True Wireless network name is the SSID (Service Set Identifier)

IEEE 802.11n is backward compatible to 802.11a, 802.11b, and 802.11g networks.

True 802.11n networks can operate at either 5 GHz or 2.4 GHz making them backward compatible. However, the older devices cannot exceed their original speed.

Ethernet switches operate at layer 2 of the OSI model.

True Data Link Layer

On a domain-based Widnows network, a client computer is identified by its FQDN.

True Fully Qualified Domain Name (FQDN)

TCP protocol provides guaranteed delivery of data.

True (UDP does not)

In this UNC example \\mis1\myresources, "mis1" is the name of the network share that is located on the the server named "myresources". False True

False

It is considered that Ethernet was invented in 1980.

False

Layer 4 of the OSI model is called the network layer.

False

Layer 4 of the OSI model is called the session layer.

False

On a client/server network, all computers are equal to each other.

False

On any computer, only 100 communication sessions can be established as needed.

False

Subnetting is the process of sending data from one computer to another across a network.

False

The Ethernet network access protocol CSMA/CD stands for Carrier Sending Multiple Access/Collision Detection.

False

The Ethernet network access protocol CSMA/CD stands for Carrier Sending Multiple Access/Collision Detection. True False

False

The IP protocol contains a source physical address and a destination physical address.

False

The IPv4 protocol header contains a sender's physical address and a receiver's physical address.

False

The IPv6 protocol header has 40 binary bits.

False

The IPv6 protocol header is 20 byte long.

False

The acronym LAN stands for Long-distance Area Network.

False

The most popular network topology used in local area networks (LAN) is the ring topology.

False

The physical address is defined at layer 3 of the OSI model.

False

The physical address is defined at the transport layer of the OSI model.

False

The port numbers are defined and used at the network layer of the OSI model.

False

The role of a physical address is to uniquely determine a destination network on which a device is located.

False

The standard IP protocol header size is 20 bits.

False

There are only 16 communication sessions that can be established on a computer, .

False

UDP protocol uses a three-way handshake procedure to verify and establish connectivity.

False

UTP cables are widely used on modern computer networks. The acroynm UTP stands for Untwisted Transmission Pairs.

False

Zoom video service is an example of PaaS.

False

The standard UDP header has 160 bits.

False 32

The OSI Model has four layers, while the TCP/IP Model has seven layers.

False (The OSI Model has seven layers, and the TCP/IP Model has four layers.)

A router is an OSI layer 4 device

False Correct answer: layer 3

A router is a type of networking device that is typically used to connect client devices or desktop computers to a network.

False Switches are used to connect devices to a network

At layer 2 of the OSI model, the network to network data communications or the routing is handled.

False Transport Layer

New categories of UTP cables are widely used on modern computer networks. The acronym UTP stands for Untwisted Transmission Pairs.

False unshielded twisted pair

The Ethernet network access protocol CSMA/CD stands for Carrier Sending Multiple Access/Collision Detection.

False - Carrier Sensing Multiple Access with Collision Detection

A computer's MAC or physical address is defined at layer 3 of the OSI model.

False - Defined at the Link Layer (layer 2)

The Internet Protocol is defined at the transport layer of the TCP/IP network model.

False - the internet layer

UTP cables are widely used on modern computer networks. The acroynm UTP stands for Untwisted Transmission Pairs. True False

False Unshielded Twisted Pair

A computer's MAC or physical address is defined at layer 3 of the OSI model.

False, layer 2, The Data Link Layer

Which of the following types of cables relies on pulses of laser light to carry data?

Fiber optic

OSI Network Layer

Handles addressing of network nodes/users(by IP) and the routing data between them. THE INTERNET

UDP

User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism. NOT TRACKABLE

Windows 10 or 8 OS professional or enterprise editions are designed as server operating systems. a. True b. False

b. False

Which of the following cloud services can NOT be configured? a. PaaS b. SaaS c. IaaS d. Private cloud

b. SaaS

Which of the following commands can be used to view the communication sessions on a Windows computer?

netstat

MAC address is also called

physical address Built into computer

Which of the following commands can be used to check end to end connectivity?

ping

To rename a client computer, you must have

the local administrator's right

What is the data rate of the current state of art IEEE 802.11ac standard (wave 1)?

up to 1.3 Gbps

Which range of TCP or UDP port numbers are typically used on client computers?

dynamic ports

In the above picture, the physical network topology is

Star

In the enclosed picture, the network topology is

Star

In this picture, the network topology is

Star

Which of the following protocols is not a routing protocol? RIP OSPF TCP

TCP

Which of the following protocols is not a routing protocol?

TCP Correct answers: RTVS, VOIP, HTTP; HTTPS ,RTRS, RDP, SMTP, POP3, FTP, SMB, MIME

Which of the following commands can be used to view a Windows computer's physical and logical address in the same time?

ipconfig /all

The root directory of the entire file system hierarchy of a Linux OS is represented by: . (a dot) ~ / \

/

Which range of TCP or UDP port numbers are reserved for servers?

0-1023

What is the range of decimal values that can be represented by 8 binary bits?

0-255

Given a class A IPv4 address, what is the range of binary bits that can be borrowed from the host portion to create subnets?

1-22

To transmit 1 Giga bits of data using a device that has a data transmission rate of 100Mbps, how long will it take?

10 seconds

Convert this hex number to a binary number: ABCD. Which of the following is the right answer?

1010101111001101

Which of the following IP addresses is NOT in one of the reserved private IP address ranges?

11.80.25.1

Every MAC address has how many hex digits?

12

If 12 binary bits are borrowed from the host portion of a class A IPv4 address, how many bits are left for the host IDs for each subnet?

12

What is the subnet network ID for the following CIDR IP address: 120.80.168.1 /16?

120.80

Based on the classful IPv4 addressing system, how many class A networks are available?

126

Based on the classful IPv4 addressing system, how many valid class A networks are available?

126

Class B Address Range

128-191

Given an IP address 129.65.192.224 with a subnet mask 255.255.128.0. If we want to represent it using the CIDR notation, what will it be?

129.65.192.224/17

Refer to the following physical address: 18-03-73-14-F5-50 What is the portion that is assigned by the vendor or manufacturer? 18-03-73 18-03-73-14-F5-50 14-F5-50 Can not decide

14-F5-50

On the physical address highlighted, what is the portion that is assigned by the manufacturer? 18-03-73-14-F5-50

14-F5-50 Vender = first three Factory Assigned = Last three

In the IPv4 addressing system, how many class B network ID's are possible? (You may use the MS-Windows Calculator.)

16384

In the original IPv4 addressing system, how many class B network ID's are possible? (You may use the MS-Windows or your Calculator.)

16384

A book has 550 pages. Assume each page has 50 lines, and each line has 85 characters. If we convert this book into a digital document with no overhead, what is the amount of data generated?

18.7 Million bits

A book has 550 pages. Assume each page has 50 lines, and each line has 85 characters. If we convert this book into a digital document with no overhead, what is the amout of data generated?

18.7 Million bits

Class C Address Range

192-223

Deploying a firewall to protect an entire enterprise network is called domain-level security. True False

False

A global unicast IPv6 address normally begins with a hex digit of _______.

2 3

Each IPv6 address has 128 hexadecimal digits.

False

What radio frequency does an IEEE 802.11g network use?

2.4 GHz

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be simplified using just the zero compression approach?

2001::9e76:04c9:009b:3f57:0e98

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be written using the zero compression approach?

2001::9e76:04c9:009b:3f57:0e98

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:0000:0e98. How can this address be simplified using both the dropping leading zeros and zero compression methods?

2001::9e76:4c9:9b:0:e98

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be written using both the dropping leading zeros and zero compression methods?

2001::9e76:4c9:9b:3f57:e98

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be written using the dropping leading zeros and zero compression shorthand approaches?

2001::9e76:4c9:9b:3f57:e98

Based on the IPv4 addressing system, how many binary bits are allocated to the host ID portion of a class A network?

24

Based on the original IPv4 addressing system, how many binary bits are allocated to the host ID portion of a class A network?

24

Suppose a IPv4 network has 16 bits in its host ID. What will be the subnet mask for this network?

255.255.0.0

What is the subnet mask of the following CIDR IP address: 38.168.1.5 /16?

255.255.0.0

What is the subnet mask of the following IP address: 138.168.1.5 /16?

255.255.0.0

What is the subnet mask of the following IP address: 192.168.1.5 /16?

255.255.0.0 (The /16 in the IP address is CIDR notation indicating how many bits are a 1 in the subnet mask. The subnet mask is 255.255.0.0.)

Which of the following is NOT a valid IP address?

256.10.1.100

192.168.43.0/26

26 Bits in Network ID, Subnet Mask is last divider and bit length. Host is rest

How many groups of zeros have been compressed in the following IPv6 address: fe80::3242:0:0:a8a1

3

Convert the following IPv6 address from binary to a simplified HN format: 00111111111011111110110111001101111101000110111101110100110001010000000000000000000000000000000000000000000000000000000000000000

3fef:edcd:f46f:74c5::

You are working on a computer and see that it has an IPv6 address of 2001:0001::41f0:f763. How many groups of 0s have been omitted?

4

You are working on a computer and see that it has an IPv6 address of 2001::41f0:f763:52f6. How many groups of 0s have been compressed?

4

Which of the following WKP port number is typically used on secure Web servers?

443 (DNS uses port 53. SMTP uses port 25. HTTP uses port 80. Secure LDAP uses port 636.)

A full mesh network has 10 nodes, What are the total links required to have all 10 nodes connected to each other?

45

Bits in a MAC address

48 bits

In the screen shot above, for the highlighted line, what is the TCP port number used on the local computer?

49514

What radio frequency band is used in IEEE 802.11ac standard?

5 GHz

What radio frequency is the upcoming IEEE 802.11ac Wave 2 standard going to use?

5 GHz

If we want to set up a firewall to block DNS traffic, then which port should be used?

53

The preamber field used in Ethernet frame has how many binary bits?

56

The preamber field used in Ethernet frame has how many binary bits? 7 56 48 1500

56

What is the standard size (in binary bits) of the UDP protocol?

64

Suppose we have a class B network. What is the maximum of unique host IDs that can be assigned to computers on this network?

65534

How many TCP or UDP port numbers are possible?

65536

In total, how many TCP or UDP port numbers are available?

65536

An IP address in CIDR notation is 66.16.76.25/18. The equivalent subnet mask is 255.255.0.0.

False

Based on the original IPv4 addressing system design, how many binary bits are allocated to the host ID portion of a class C IP address?

8

Given a class B IPv4 address, if we want to create 138 subnets, how many binary bits need to be borrowed from the host portion?

8

Given the following IP address with its subnet mask. How many bits are in the host ID portion: 198.120.150.166, subnet mask 255.255.255.0

8

Given the following IP address with its subnet mask. How many bits are in the host ID portion: 199.120.150.166, subnet mask 255.255.255.0

8

IPv6

8 Groups of Hex, 128 Bits

An NAT device can only convert private IP addresses to public IP addresses. True False

False

If we store 10 symbols or characters in a Notepad file, what will be the size of this file in binary bits?

80

In the screen shot above, for the highlighted line, what is the TCP port number used on the remote computer?

80

In the screen shot above, for the highlighted line, what is the TCP port number used on the remote server?

80

WKP Internet Port?

80

Which of the following WKP port number is used for Web servers?

80

Which of the following WKP port number is typically used on Web servers?

80 (DNS uses port 53. SMTP uses port 25. HTTP uses port 80. Secure LDAP uses port 636.)

Which of the following WKP port number is typically used on non-secure Web servers?

80 (DNS uses port 53. SMTP uses port 25. HTTP uses port 80. Secure LDAP uses port 636.)

The latest development in Wi-Fi standard is 802.11n 802.11ad 802.11ac 802.11g

802.11ad

Wi-Fi 6 refers to which one of the following IEEE standard?

802.11ax

Based on the IPv4 addressing system, only 16384 Host IDs are possible for each class B network.

False

Based on the screen shot, we can say for sure that the server is not available.

False

What is the top data rate specified in IEEE 802.11ax standard?

9.6 Gbps

Map the following IPv4 address into an IPv6 address using the dual IP stack approach: 137.129.8.2

::FFFF: 8981:0802

Which of the followings refers to host security?

A proxy server is used. A firewall device is installed on the edge of a network. Correct Response Enable automatic update on a client computer. Create a security or DMZ zone on a network.

Microsoft Windows firewall supports 3 types of location profiles or settings. Which one of the followings is NOT one of them?

Airport Does Support: Home, Public places, Domain

SMTP operates on which layer of the Internet Model?

Application

When a server on a network sends a message to all computers or devices on the network, which type of data transmission is this?

Broadcast

Which class is the following classful IP address? 12.17.5.3

Class A

Which one of the following commands allows us to view the domain policies applied on a domain computer?

C:\>gpresult /r

Which of the following is the media access protocol used on wireless Ethernet networks?

CSMA/CA

Which of the following is the media access protocol used on wireless Ethernet networks? CSMA/CD CSMA/CA TCP Token passing

CSMA/CA

Which of the following is the media access protocol used on wireless Ethernet networks?

CSMA/CA Carrier sense multiple access with collision avoidance

OSI Transport Layer

Concerns the reliability of data transfer between systems.

A wireless access point (WAP) device used on a SOHO network typically supports many roles. What are these roles?

DHCP firewall Router

Based on the screen shot of a computer's system property, this computer is in which networking mode?

Domain-based (see q-1 quiz 7 lecture picture)

Cent OS is a proprietary client OS.

False

Which of the followings is a way to enhance client security? A proxy server is used. A firewall device is installed on the edge of a network. Enable automatic update on a client computer. Create a security or DMZ zone on a network.

Enable automatic update on a client computer.

How does the internet connect to a device

Every device needs a unique physical address

A client OS is generally designed for a multi-user environment.

False

A client/server network must be a domain based network.

False

A computer's MAC or physical address is defined at layer 3 of the OSI model.

False

A computer's MAC or physical address is defined at layer 3 of the OSI model. False True

False

A computer's physical address is defined at the physical layer of the OSI model.

False

A computer's physical address is used to determine on which network or subnet the computer is located.

False

A data string 110010010 is received which contains 1 odd parity bit at the end of the string. Based on the algorithm learned in class, we can say no transmission error has occurred.

False

A data string 110010010 which contains 1 odd parity bit is received. Based on the algorithm learned in class, we can say no transmission error has occurred.

False

A network-based or hardware based firewall cannot be used to protect an entire network.

False

A router is a type of networking device that is typically used to connect client devices or desktop computers to a network. True False

False

A router is an OSI layer 4 device. True False

False

Subnet Mask

Formatting of IP address to create more networks and customize host connections.

The transmission mode where data can travel back and forth simultaneously is called:

Full Duplex

In the enclosed picture, the network topology is

Full Mesh

In the following picture, the network topology is

Full Mesh

The picture below describes which type of transmission mode in terms of data flow directions?

Full-duplex (b/c 2 directions and simultaneous flow)

In the above picture, the physical network topology is

Hierarchical

HTTP

Hypertext Transfer Protocol

The wireless Ethernet family of standards altogether is often called as

IEEE 802.11x

The wireless Ethernet family of standards altogether is called as

IEEE 802.11x Original Ethernet Fast Ethernet Gigabyte Ethernet 10 Gigabyte Ethernet

Which of the following standards supports a data rate at 1000Mbps? IEEE 802.3ab IEEE802.3u IEEE 802.3ae IEEE 802.3

IEEE 802.3ab

Which of the following standards supports a data rate at 1000Mbps?

IEEE 802.3ab FastEthernet: 100Mbps standards: 802.3u Gigabit Ethernet: 1000-Mbps standards: 802.3z (fiber) and 802.3ab (CAT5e or above) 10 Gigabit Ethernet: 802.3ae - fiber 802.3an

The official FastEthernet standard is called

IEEE 802.3u

The official FastEthernet standard is called IEEE 802.3 IEEE 802.3z IEEE 802.3ab IEEE 802.3u

IEEE 802.3u

The official FastEthernet standard specification is called

IEEE 802.3u

Which of the following protocols is not an Application Layer protocol?

IP

Based on the screen shot above from a computer, what is this computer's FQDN:

IS-DC01.ISNET.UWEC.EDU FQDN: fully qualified domain name

Linode offers cloud service at which service level?

IaaS

Linode offers cloud service at which service level? IaaS PaaS SaaS On-demand service

IaaS

In the TCP/IP network model, which layer is responsible for routing IP packets to their destinations?

Internet

A group of computers are connected in a single location such as in a room or on a floor of a building. What is this type of network called?

LAN

A network is located in a single location such as in a room or on a floor of a building. What is this type of network called?

LAN

The TCP/IP protocol suite is a collection of protocols defined at multiple layers of the TCP/IP network model. Which of the following is not one of those layers?

Link Correct: Internet, Transport, Application

Subnet Equation

Log(x)/Log2

In the above picture, the physical network topology is

Mesh

What is the collection of Microsoft's cloud computing offerings generally called?

Microsoft Azure

Which one of the following is Microsoft's major cloud computing technology?

Microsoft Azure

Which one of the follwoings is Microsoft's major cloud computing technology? Microsoft Servers Operating Systems Microsoft Office 365 Microsoft Azure Microsoft Windows 10 Operating Systems

Microsoft Azure

Which of the following allows a web site to be created on a computer?

Microsoft Internet Information Services

Which of the followings is NOT a cloud computing service delivery model?

Microsoft Office 365

Which of the followings is NOT a cloud computing service model? SaaS IaaS Microsoft Office 365 PaaS

Microsoft Office 365

Which of the followings is an example of Software as a service (SaaS)? An OS installed on a VM in cloud A web site created in a CentOS server Microsoft Office 365 Apache server installed in a CentOS virtual machine

Microsoft Office 365

Whihc of the followings is an example of Software as a service (SaaS)?

Microsoft Office 365

OSI Presentation Layer

OSI model protocol responsible for "managing and translating the information into an understandable format that the Application layer can process further. Many "Application-layer" protocols function at the Presentation layer too, taking datagrams and segments and turning them into formats programs can use".

OSI Physical Layer

OSI model protocol responsible for defining the electrical signals that travel the network cables and connectors

OSI Data Link Layer

OSI model protocol responsible for making the rules for gathering and completing all the elements that make up a data frame and putting the whole thing together so that it can be passed to a Physical-layer device and on to the network?

What defines the agreements, standards or rules that computers and other devices use to communicate with each other on networks?

Protocols

Which of the followings is a type of routing protocol that determines the optimal routing path based on the number of hops in a route between a source and destination computer?

RIP

Which of the followings is a type of routing protocol that determines the optimal routing path based on the number of hops in a route between a source and destination computer? RIP OSPF IP DHCP

RIP

When you send an email, which of the following application layer protocols will be used?

SMTP

Which of the following cloud services can NOT be configured? PaaS SaaS IaaS Private cloud

SaaS

SMTP

Simple Mail Transfer Protocol

On the screen above, what is the computer's logical address?

The logical address is also the IPv4 address

OSI Application Layer

The seventh layer of the OSI Model which provides services directly to the user and allows the user to use the network

TCP is a transport layer protocol. The acronym TCP stands for

Transmission Control Protocol

TCP

Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

172.16.10.120 is a private class B IP address.

True

A Windows domain is created on servers called domain controllers.

True

A cloud service typically has a monthly allowance on the amount of traffic included in the monthly cost. True False

True

A data transmission rate of 100Mbps means 100,000,000 bits of data can be transmitted in one second.

True

A data transmission rate of 100Mbps means 100,000,000 bits of data can be transmitted per second.

True

A motivation of developing the IPv6 addressing is because of the smaller addressing space offered by IPv4 addressing system.

True

A routing protocol is essentially an implementation of a mathmatical algorithm to determine the best path between two end points.

True

A switch operates at layer 2 of the OSI model. True False

True

A top of the line WiFi 6 router is often a tri band device.

True

A workgroup-based network has inherent weakness in security management, bacause it relies on individual users to mange each computer on the network.

True

After a Windows domain has been created, a user must be centrally authenticated in order to log on to the domain.

True

After a client computer has joined to a domain, it can be centrally controlled by domain controllers.

True

Each IPv6 address consists of two components: the network ID and the host ID which is also called extended unique identifier (EUI).

True!

Which of the followings is NOT an example of Software as a service (SaaS)?

Virtual Machines created in Microsoft Azure

Which of the followings is not a client OS?

Windows Server 2019

Based on the screen shot above from a computer, we can say this computer is a:

a server (background services instead of programs)

Which class is the following classful IP address? 126.17.5.3 a. Class A b. Class B c. Class C d. Class D

a. Class A

Which of the following Ethernet standards supports a data rate at 1000Mbps? a. IEEE 802.3ab b. IEEE802.3u c. IEEE 802.3ae d. IEEE 802.3

a. IEEE 802.3ab

Linode offers cloud service at which service level? a. IaaS b. PaaS c. SaaS d. On-demand service

a. IaaS

Which of the followings is a type of routing protocol that determines the optimal routing path based on the number of hops used in a route? a. RIP b. OSPF c. IP d. DHCP

a. RIP

A switch operates at layer 2 of the OSI model. a. True b. False

a. True

After a Windows domain has been created, if a user wants to log on to the domain, then a domain user account must be used. a. True b. False

a. True

An essential characteristic of cloud service is the cloud computing cost can be measured. a. True b. False

a. True

Each Ethernet frame contains a sender's physical address and a receiver's physical address. a. True b. False

a. True

Each switch has a bridge table that maps the switch's physical ports to connected computers' physical addresses. a. True b. False

a. True

Each type of data communication application needs to be supported by a specific application layer protocol. a. True b. False

a. True

IEEE 802.11ac Wave 2 standard supports only 5GHz frequency band. a. True b. False

a. True

IaaS allows ultimate flexibility in cloud service configurations. a. True b. False

a. True

If data needs to be transmitted from one subnet to another, a router or a gateway will need to be used. a. True b. False

a. True

Microsoft Windows desktop client operating systems are generally designed for two scenarios: home users and business users. a. True b. False

a. True

The IEEE 802.11 committe was created to define wireless Ethernet networking standards. a. True b. False

a. True

The data carried with UDP protocol can not be traced. a. True b. False

a. True

The hexadecimal value of the decimal number 400,000 is 61A80. a. True b. False

a. True

The location of a cloud server is a factor to consider when we choose a cloud server to use. a. True b. False

a. True

The minimum Ethernet frame size is 72 bytes. a. True b. False

a. True

The notation IEEE 802.11x generally refers to all wireless Ethernet standards. a. True b. False

a. True

To manage a large number of client computers effectively, they can be put in a Windows domain. a. True b. False

a. True

Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or OUI? a. 00-0C-29-E5-84-25 b. 00-0C-29 c. E5-84-25 d. Can not decide

b. 00-0C-29

What is the subnet ID (in binary format) for the subnet to which the following IP address belongs? 100.75.125.200/11 a. 111 b. 010 c. 1011 d. 000

b. 010

The preamber field used in Ethernet frame has how many binary bits? a. 7 b. 56 c. 48 d. 1500

b. 56

Suppose we have a class B network. How many computers with unique host IDs can be put on this network? a. 254 b. 65534 c. 16,777,214 d. 256

b. 65534

Based on the original IPv4 addressing system design, how many binary bits are allocated to the host ID portion of a class C IP address? a. 24 b. 8 c. 16 d. 32

b. 8

Wi-Fi 6 refers to which one of the following IEEE standard? a. 802.11n b. 802.11ax c. 802.11ac d. 802.11g

b. 802.11ax

Which of the following is the media access protocol used on wireless Ethernet networks? a. CSMA/CD b. CSMA/CA c. TCP d. Token passing

b. CSMA/CA

A computer's MAC or physical address is defined at layer 3 of the OSI model. a. True b. False

b. False

A computer's physical address is used to determine on which network or subnet the computer is located. a. True b. False

b. False

A data string 110010010 which contains 1 odd parity bit is received. Based on the algorithm learned in class, we can say no transmission error has occurred. a. True b. False

b. False

A router is a type of networking device that is typically used to connect client devices or desktop computers to a network. a. True b. False

b. False

A router is an OSI layer 4 device. a. True b. False

b. False

A router routes data based on physical addresses. a. True b. False

b. False

A switch transmits data based on a computer's IPv4 address. a. True b. False

b. False

An IP address in CIDR notation is 66.16.76.25/18. The equivalent subnet mask is 255.255.0.0. a. True b. False

b. False

Each IPv6 address has 128 hexadecimal digits. a. True b. False

b. False

The Ethernet network access protocol CSMA/CD stands for Carrier Sending Multiple Access/Collision Detection. a. True b. False

b. False

To refer a GigabitEthernet type of port on a switch, we prefix it with a letter E and then the port number. a. True b. False

b. False

UDP protocol provides guaranteed delivery of data. a. True b. False

b. False

UTP cables are widely used on modern computer networks. The acroynm UTP stands for Untwisted Transmission Pairs. a. True b. False

b. False

When a server on a network sends a message to all computers or devices on the network, which type of data casting is used?

broadcast

The root directory of the entire file system hierarchy of Cent OS is represented by: a. . (a dot) b. ~ c. / d. \

c. /

Refer to the picture above. On the physical address highlighted, what is the portion that is assigned by the vendor or manufacturer? a. 18-03-73 b. 18-03-73-14-F5-50 c. 14-F5-50 d. Can not decide

c. 14-F5-50

Suppose a IPv4 network has 22 bits in its host ID portion. What will be the subnet mask for this network? a. 255.255.224.0 b. 255.255.255.0 c. 255.192.0.0 d. 255.248.0.0

c. 255.192.0.0

How many TCP or UDP port numbers are possible? a. 3389 b. 80 c. 65536 d. 1024

c. 65536

Which of the following WKP port number is typically used on Web servers? a. 25 b. 53 c. 80 d. 636

c. 80

Which of the following protocols is not an Application Layer protocol? a. SMTP b. POP3 c. IP d. FTP

c. IP

What is Microsoft's cloud computing technology offering called? a. Microsoft Servers Operating Systems b. Microsoft Office 365 c. Microsoft Azure d. Microsoft Windows 10 Operating Systems

c. Microsoft Azure

Which of the followings is NOT a cloud computing service model? a. SaaS b. IaaS c. Microsoft Office 365 d. PaaS

c. Microsoft Office 365

Which of the followings is an example of Software as a service (SaaS)? a. An OS installed on a VM in cloud b. A web site created in a CentOS server c. Microsoft Office 365 d. Apache server installed in a CentOS virtual machine

c. Microsoft Office 365

Which of the following protocols is not a routing protocol? a. RIP b. OSPF c. TCP

c. TCP

Given a class A IPv4 address, what is the range of binary bits that can be borrowed from the host portion to create subnets? a. 1-8 b. 1-16 c. 1-24 d. 1-22

d. 1-22

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be shorthanded using the zero compression approach? a. 21:0000:0000:9e76:04c9:009b:3f57:0e98 b. 2001:0000:0000:9e76:4c9:9b:3f57:e98 c. 2001:0000:9e76:04c9:009b:3f57:0e98 d. 2001::9e76:04c9:009b:3f57:0e98

d. 2001::9e76:04c9:009b:3f57:0e98

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:0000:0e98. How can this address be shorthanded using both the dropping leading zeros and zero compression methods? a. 21:0000:0000:9e76:04c9:009b::0e98 b. 2001:::9e76:04c9:009b:0000:0e98 c. 2001::9e76:4c9:9b::e98 d. 2001::9e76:4c9:9b:0000:e98

d. 2001::9e76:4c9:9b:0000:e98

Given a class B IPv4 address, if we want to create 138 subnets, how many binary bits need to be borrowed from the host portion? a. 5 b. 6 c. 7 d. 8

d. 8

If 15 binary bits are borrowed from the host portion of a class A IPv4 address, how many bits are left for the host IDs for each subnet? a. 17 b. 7 c. 12 d. 9

d. 9

The official FastEthernet standard is called a. IEEE 802.3 b. IEEE 802.3z c. IEEE 802.3ab d. IEEE 802.3u

d. IEEE 802.3u

When you send an email, which of the following application layer protocols will be used? a. SNMP b. POP c. HTTP d. SMTP

d. SMTP

Based on the screen shot above from a computer, we can say this computer is a a. client computer b. a tablet c. a smartphone d. a server

d. a server

Which of the following allows a web server to be created on a CentOS server? a. yum update b. run Internet Explorer c. install Internet Information Services d. yum install httpd

d. yum install httpd

The name of the data unit at layer 2 of the OSI model is called ____.

frame

The preamble filed used in Ethernet frame is to ____.

get the attention of the receiver synchronize the sender and the receiver let other devices know that a device is going to send data to the network

A computer's logical address is used to determine on which network or subnet the computer is located

true!

A motivation of developing the IPv6 addressing is because of the smaller addressing space offered by IPv4 addressing system.

true!

Each IPv6 address has 32 hexadecimal digits

true!

Which of the following allows a web site to be created on a CentOS server? yum update run Internet Explorer install Internet Information Services yum install httpd

yum install httpd


Kaugnay na mga set ng pag-aaral

WEEK 14 EXERCISE 1 - "b" ANSWERS ONLY

View Set

Chapter 6 Section 1 Reading guide

View Set

Chapter 4. Activity-Based Costing (SmartBook)

View Set

Module 3: Using a Learning Management System

View Set

Inventory Management Terminology

View Set

Principles Of Fire Behavior And Combustion MidTerm

View Set

Unit 3: Private Sources of Funds

View Set