IT 2600 Practice Midterm 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An Address Resolution Protocol message is broadcast to all computers in a subnet to find the data link layer address of a host whose IP address is known but whose MAC address is unknown.

True

An example of an application layer address is www.indiana.edu.

True

Are these hosts on the same network Source: 136.130.242.194 Destination: 136.130.242.222 Subnet Mask: 255.255.255.224

True

Are these hosts on the same network Source: 30.239.24.15 Destination: 30.239.30.255 Subnet Mask: 255.255.248.0

True

Is this IP address configuration valid for an internet host? IP: 174.111.190.249 Subnet: 255.255.224.0

True

TCP/IP is a data link protocol that is used on the Internet.

False

The application layer is the seventh layer of the Internet model and specifies the type of connection and the electrical signals that pass through it.

False

A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?

IDF

What does IANA stand for?

Internet Assigned Numbers Authority

What is the standard connector for the 10 GbE fiber standard?

There is no standard.

Which is not a function of the physical layer:

providing error-free transmission of data.

__________ is not an important function of the transport layer.

routing

The transport layer must break messages from the application layer into several _____ that can be sent to the network layer.

segments

Which of the following is not a function of the data link layer?

specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it

Is this IP address configuration valid for an internet host? IP: 100.134.257.3 Subnet: 255.255.240.0

False

The OSI model is currently the most widely implemented network model used to develop and build networks of any size, including the Internet itself.

False

The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.

False

The transport layer routes messages through the network selecting the best path from the source to the destination station.

False

The following addresses are on the same network?155.55.5.5/16155.55.6.6/16

True

Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution.

True

In the IP model the Internetwork Layer is responsible for error free communications.

False

What is the class full subnet mask for the IP address 99.187.60.50?

255.0.0.0

Your ISP sent you the following information. Default Gateway 10.21.169.32/15 What is the proper subnet mask for this IP address (in dotted decimal format)?

255.254.0.0

What is the class full subnet mask for the ip address 191.187.60.50?

255.255.0.0

UVU needs a new Campus Area Network. Classrooms may have different numbers of host computers. The largest classroom will have no more than 60 host computers. What subnet mask accomplishes the goal and maximizes the number of subnets that may be created?

255.255.255.192

Given the subnet mask 255.255.255.224. How many host addresses are on this network?

30

If a network has a subnet mask of 255.255.255.224, how many host addresses are on the network

30

How many pairs of wires are in a Cat 5e-rated cable?

4

When DHCP Discover fails, what process will the client use to generate an address for itself?

APIPA (Automatic Private IP Addressing)

_________created a service that allows organizations to transfer IPv4 addresses they don't need to another organization.

ARIN

A(n) _________ is a specially formatted request used to perform IP address to data link address resolution.

Address Resolution Protocol request

A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?

Allow ICMP to pass through the Router

____________ is not a function of a data link protocol.

Amplitude shift keying

Which of the following enables you to use multiple NICs in a computer to achieve a much faster network speed?

Bonding

Which of the following topologies required termination?

Bus

Which of the following is rated for speeds over 800Mbps?

CAT6

Which of the following tools would a technician use to determine if a CAT6 patch cable has an open or short?

Cable tester

203.50.5.0 is an example of which of the following network classes?

Class C

Which of the following is MOST likely used with RG-6 media?

F-connector

Are these hosts on the same network Source: 108.20.225.64 Destination: 108.15.0.1 Subnet Mask: 255.240.0.0

False

Coaxial cable costs less and offers less shielding to electrical interference than twisted pair cable.

False

Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.

False

A network engineer is dispatched to an employee office to troubleshoot an issue with the employee's laptop. The employee is unable to connect to local and remote resources. The network engineer flips the laptop's wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue resolved?

Layer 1

Frame relay occurs at which of the following layers of the OSI model?

Layer 2

The MAC address of a network device is used to communicate at which of the following OSI layers?

Layer 2

A router operates at which of the following layers of the OSI model?

Layer 3

Which of the following refers to a network that spans several buildings that are within 10 miles of each other?

MAN

Which network topology is most commonly seen only in wireless networks?

Mesh

At which of the following layers of the OSI model does ASCII work?

Presentation

Which MAC address begins a frame?

Receiving system

Which network topology connected nodes with a ring of cable?

Ring

A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?

Run the ifconfig command on the workstation.

Which of the following connectors are used by 10BaseFL cable? (Select two.)

ST, SC

Why are networks set up with multi-layer models?

To make them easier to fix and update with technology changes

A destination port number at the transport layer identifies which application on a computer should receive the data transmission.

True

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?

application layer address

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.

broadcast message

In a _________ , more than one data bit is changed by the error-causing condition.

burst error

With QoS routing different __________ are defined, each with different priorities.

classes of service

What Windows utility do you use to find the MAC address for a system?

ipconfig /all

A(n) _______________ organizes and protects the horizontal cabling in the telecommunications room.

patch panel

Data is physically transmitted from one computer or terminal to another in the ________ layer.

physical

The ____________ layer of the OSI model is responsible for data format translation.

presentation

A(n) ________ refers to a group of computers that are logically grouped together by IP number.

subnet

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.

transport

The fourth layer of the OSI model is called the __________ layer.

transport

A type of message that is used when sending a message from one computer to another computer is called a:

unicast message

The Ethernet protocol is defined at what layer in the OSI model.

****WRONG****1

A repeater operates at what layer of the OSI model?

****WRONG****2

A Local Area Network is defined as ________

****WRONG****All the computers in a building

Which of the following OSI model layers are present in the application layer of the TCP/IP model? (Select TWO).

****WRONG****Network, Data Link

A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Select 2 answers)

****WRONG****Set subnet masks to 255.255.255.0 Add a switch between the hosts

The first octet of an IP address is 01110101, what class of network is the IP address in?

****WRONG****b

What is the first valid host on the subnetwork that the node 172.24.121.68 255.255.255.240 belongs to?

***WRONG****172.24.121.62

Your ISP sent you the following information. Default Gateway 131.75.69.32/23 What is the proper subnet mask for this IP address (in dotted decimal format)?

***WRONG***11111111.11111111.1111111 0.00000000

A company has been given a Class C address to be utilized for all devices. The company has several subnets and the largest subnet has 15 hosts. Which of the following represents the MINIMUM CIDR notation of this subnet mask?

/27

Which of the following is an example of a MAC address?

00:50:56:A3:04:0C

Identify the network ID section of the following IP address :10.14.12.43 Subnet mask: 255.255.255.0.

10.14.12

What is the broadcast address of the network 10.32.176.0 255.255.240.0?

10.32.191.255

Which of the following is the FASTEST Ethernet technology?

10GBaseSR

Your ISP sent you the following information. Default Gateway 130.75.69.32/21What is the proper subnet mask for this IP address(in dotted decimal format)?

11111111.11111111.11111000.00000000

A technician, Fred, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?

127.0.0.1

Which of the following is a valid loopback address?

127.24.0.1

Convert 10101010 to decimal ______

128 + 0 + 32 + 0 + 8 + 0 + 2 + 0 = 170

IPv6 is based upon _________ -byte addresses.

16

What is the first valid host on the subnetwork that the node 172.22.17.46/28 belongs to?

172.22.17.33

What is the first valid host on the subnetwork that the node 172.23.75.10 255.255.255.192 belongs to?

172.23.75.1

What is the last valid host on the subnetwork 172.24.198.0/23?

172.24.199.254

What is the last valid host on the subnetwork 172.24.31.0 255.255.255.0?

172.24.31.254

What is the broadcast address of the network 172.26.8.0/23?

172.26.9.255

Which subnet does host 172.28.245.101/28 belong to?

172.28.245.96

What is the last valid host on the subnetwork 172.31.0.0 255.255.240.0?

172.31.15.254

The older version of IP has a ________ header of control information.

192-bit

Which of the following is an example of an IPv4 address?

192.168.1.254

What is the last valid host on the subnetwork 192.168.135.0/26?

192.168.135.62

Is this IP address configuration valid for an internet host? IP: 10.1.2.3 Subnet: 255.255.240.0

False

Which of the following OSI model layers is used to frame packets that are sent over a medium?

Data link

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

De-encapsulation

Of the topologies listed, which one is the most fault-tolerant?

Star

Is this IP address configuration valid for an internet host? IP: 163.95.48.246 Subnet: 255.255.240.0

True


Ensembles d'études connexes

Chapter 6 - Measuring the Cost of Living

View Set

Section 4.2 Part 2: Reciprocals and Dividing Fractions

View Set

Accounting 326 (Ledwith)- Cumulative FInal

View Set

AVC: scapula, humerus, radius and ulna

View Set

Processing Crime and Incident Scenes (Review) - [Computer Forensics]

View Set