CIT 240 Quiz 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which pins are used in a Cat 5 Ethernet (100BASE-T) UTP cable?

1, 2, 3, and 6

Which of the following mechanisms are used on Ethernet networks to control access to the transmission medium? (Select two.)

Backoff Collision detection

Match the TCP/IP layers with their function.

Breaks the data into pieces. ✓Transport Prepares the data to be sent. ✓Application Adds physical addesses. ✓Link Adds logical addresses. ✓Internet

Which of the following statements are true about bridges? (Select two.)

Bridges convert one type of transmission medium into another. Bridges connect two network segments with the same network address.

Which fiber optic cable requires the exposed fiber tip to be polished as part of the assembly process?

Field terminated epoxy connectors

You want to implement an Ethernet network using the 1000BaseT standard using the minimum hardware specifications possible. Which of the following should you include in your plan? (Select two.)

RJ-45 connectors Cat5e twisted pair cable

Which two of the following statements accurately describe full-duplex Ethernet? (Select two.)

It is collision-free. It uses direct point-to-point connections between the sender and receiver.

Which two of the following statements accurately describe half-duplex Ethernet? (Select two.)

It uses collision detection and recovery. It sends both signals along the same wire.

What is the maximum cable length for UTP Ethernet T implementations?

100 meters

As specified in the Ethernet standards, what is the maximum number of hosts supported on a single subnet?

1024

Which of the following is true of CSMA/CD? (Select two.)

A device with data to send first listens to the transmission medium to determine whether it is free. If collisions are detected, an interrupt jam signal is broadcast to stop all transmissions.

Match each Ethernet frame component with its description.

A set of alternating ones and zeros terminated by two ones (11). ✓Preamble Information that needs to be transmitted from one host to the other. ✓Packet Verifies that the frame contents arrived uncorrupted. ✓Frame Check Sequence Identifies the receiving host's MAC address. ✓Destination address Junk data required to make 64 bytes. ✓Pad Identifies the sending host's MAC address. ✓Source address Specifies the Network/Internet layer protocol being used. ✓Type

During network transmission, data is transferred to various routers, which forward the data to the appropriate network. If the source and destination network addresses reside on the same network, which protocol is used to determine the MAC address of the destination IP address?

ARP

Which of the following methods helps to detect lost packets? (Select two.)

Acknowledgements Sequencing

Match the layers of the TCP/IP model to the corresponding layers of the OSI model. (Each option may be used more than once.)

Application ✓Application Presentation ✓Application Session ✓Application Transport ✓Transport Data Link ✓Link Physical ✓Link

Which of the following are true about Gigabit Ethernet? (Select two.)

Can use both copper and fiber optic Uses CSMA/CD

What is the purpose of a frame check sequence (FCS) footer?

Checksum error detection

You have a small network with two switches, SwitchA and SwitchB. MDI-X is not enabled on either switch. Each switch has three client computers connected. IP addresses have been assigned to various devices as follows: WrkA_1, WrkA_2, and WrkA_3 are connected to SwitchA, while WrkB_4, WrkB_5, and WrkB_6 are connected to SwitchB. All of the devices are configured to operate within the same subnet. You need to connect SwitchA and SwitchB so that workstations connected to SwitchA can communicate with workstations connected to SwitchB. What should you do?

Connect SwitchA and SwitchB using a crossover cable.

Each connection in the image is labeled A-G. Drag the cable type from the left that you would use to make each connection type.

Connection A ✓Ethernet straight-through cable Connection B ✓Ethernet crossover cable Connection C ✓Ethernet straight-through cable Connection E ✓Ethernet crossover cable Connection F ✓Ethernet straight-through cable Connection G ✓Ethernet crossover cable

At which layer of the OSI model do network switches operate that do not support routing?

Data Link

The following items describe the functions performed at various OSI model layers: 1. Logical topology, hardware addresses, media access, framing 2. Logical device identification, path identification, and selection 3. Flow control, reliable data transfer, windowing, segmentation, and sequencing 4. Converting data to 0s and 1s, bit signaling, and synchronization Which of the following correctly identifies, in order, the layers that perform each of the functions listed here?

Data Link, Network, Transport, Physical

What is the purpose of the CRC in network communications?

Detect data errors

Match each TCP and/or UDP ports to the service that uses it.

Dynamic Host Configuration Protocol (DHCP) ✓UDP ports 67 and 68 Network News Transport Protocol (NNTP) ✓TCP Port 119 Simple Network Management Protocol (SNMP) ✓UDP ports 161 and 162 Domain Name System ✓TCP and UDP port 53 Telnet ✓TCP and UDP port 23 Trivial File Transfer Protocol (TFTP) ✓UDP port 69

The process of breaking a message into packets, adding control information and other information, and then transmitting the message through the transmission medium is known as __________?

Encapsulation

Match the TCP/IP protocols with their functions. Group 1, Group 2, Group3.

Group 1 Used to get the IP address of a host from a known MAC address. ✓RARP ✓BOOTP Group 2 Used to transfer files. ✓FTP ✓TFTP Group 3 Used to identify routes through an internetwork. ✓RIP ✓OSPF

Which of the following are features of multimode fiber cable? (Select three.)

Has a core diameter around 50 to 100 microns Transfers data through the core using multiple light rays Supports only limited distance cable lengths

The TCP/IP protocol stack uses port numbers to determine protocol use. Port usage is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN). Which of the following are characteristics of registered ports? (Select two.)

Has port numbers ranging from 1024 to 49151. Is assigned by ICANN for a network service.

Which two of the following functions are performed by IP? (Select two.)

Identifying hosts with the IP address. Routing datagrams to their destination.

What role does ARP play in the routing process?

If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the destination device's IP address and requesting its MAC address.

Match each layer of the TCP/IP model to its functions. (Each layer matches with two functions.)

Is responsible for how messages are electrically transmitted. ✓Link Is responsible for forwarding packets through multiple networks. ✓Internet Is responsible for describing the physical layout of the network. ✓Link Is responsible for error checking and reliable delivery. ✓Transport Is not concerned with reliable delivery of information. ✓Internet Integrates network functionality into the host operating system. ✓Application Provides the capability for services to operate on the network. ✓Application Uses ports to enable application-to-application communications between hosts. ✓Transport

Workstation3 has started communicating with Workstation2. It sends a frame to the default gateway. Identify the Layer 2 and Layer 3 addresses used by the Cisco 2600 router to forward the data to Workstation2 by dragging the corresponding address from the list on the left to its location on the right.

Layer 2 source address 000b5f2a2222 Layer 3 source address 192.168.11.11 Layer 2 destination address 080046987654 Layer 3 destination address 192.168.10.12

Workstation2 needs to send data to Workstation3. Identify the Layer 2 and Layer 3 addresses Workstation2 will use to send the data by dragging the corresponding address from the list on the left to its location on the right. Workstation1 IP: 192.168.10.11/24 MAC: 080046123456 Workstation2 IP: 192.168.10.12/24 MAC: 080046987654 Workstation3 IP: 192.168.11.11/24 MAC: 080046982365 Catalyst 2950XL IP: 192.168.10.2/24 (Cisco 2600) inf fa0/0 IP: 192.168.10.1/24 inf fa0/2 IP: 192.168.11.1/24 MAC: 000b5f2a2223

Layer 2 source address 080046987654 Layer 3 source address 192.168.10.12 Layer 2 destination address 000b5f2a2222 Layer 3 destination address 192.168.11.11

Put the OSI model layers in order.

Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical

Which of the following are functions of the MAC sublayer in the OSI model? (Select two.)

Letting devices on the network have access to the LAN. Defining a unique hardware address for each device on the network.

Match each characteristic on the left with the appropriate fiber optic connector on the right.

MT-RJ ✓Metal guide pins for alignment LC ✓Half the size of other connectors ST ✓Bayonet-type connector SC ✓Push-on, pull-off connector

Drag the information type on the left to the appropriate layer of the OSI model that it is associated with on the right.

Network Layer ✓Packets Data Link Layer ✓Frames Physical Layer ✓Bits Transport Layer ✓Segments Application Layer ✓Data

Which of the following are limitations of the OSI model? (Select two.)

OSI layers are theoretical and do not actually perform real functions. A particular protocol implementation may not represent every OSI layer.

Which of the following describes the function of a dedicated wireless access point on a network?

On a network, a wireless access point only acts as a bridge between the wireless segment and the wired segment on the same subnet.

You are deploying a new 10GB Ethernet network using Cat 6 cabling. Which of the following are true concerning this media? (Select two.)

PVC insulation surrounds each copper wire. It supports 10 GB Ethernet connections.

An internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and HTTP services. A client computer initiates a session with the HTTP server. How is the HTTP request from the client routed to the correct service running on the server?

Port or socket number

What term does the OSI model use that is different from the TCP/IP model uses to refer to frame, packet, and segment?

Protocol data unit (PDU)

You are asked to design a LAN segmentation solution for Company AGH. They have three workgroups separated with VLANs: Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department. Which segmentation device meets the functionality requirements and provides the simplest, most economical administration?

Router

You have been put in charge of connecting two company networks that were previously separated. You need to connect a 100BaseTx Ethernet network with an older token ring network. Most traffic will be localized within each network, with only a little traffic crossing between networks. Both networks are using the TCP/IP protocol suite. Which connectivity device would be the best choice in this situation?

Router

Which of the following are general advantages of using routers on your network? (Select three.)

Routers support multiple routing protocols for better flexibility. Routers provide multiple links between devices to support load balancing. Routers provide more features, such as flow control, error detection, and congestion control, than switches or bridges.

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?

Routers use ARP to resolve known IP addresses into MAC addresses.

A client computer starts to download some files from an FTP server named FTPsvr1. While the first download is in progress, the user opens a second instance of the FTP program and initiates a second download. What do the server and the client use to keep each download separate?

Session ID

Which of the following are limitations of the TCP/IP model? (Select two.)

TCP/IP layers are theoretical and do not actually perform real functions. A particular protocol implementation may not represent every layer.

You want to implement an Ethernet network using the 100Base-FX standard and the minimum hardware specifications possible. You need to support distances of up to 1,000 meters without repeaters. Which of the following should you include in your plan? (Select two.)

Single-mode fiber optic cable SC connectors

What is the purpose of a network model?

Standardize processes at each layer.

You want to prevent collisions on your network by creating separate collision domains and defining virtual LANs. Which of the following devices should you choose?

Switch

Which of the following accurately describe how switches and hubs work? (Select two.)

Switches use the hardware address in the frame to send frames only to the port where the device is attached. A hub repeats frames to all ports, regardless of the destination address.

How does TCP handle data sequencing?

TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the next segment.

Which of the following lists accurately describes TCP and UDP? (Select two.)

TCP: connection-oriented, reliable, sequenced, high overhead UDP: connectionless, unreliable, unsequenced, low overhead

What is the first thing that happens when a collision occurs on an Ethernet network?

The device that detected the collision transmits a jam signal.

What is the backoff on an Ethernet network?

The random amount of time a device waits before retransmitting after a collision.

Which is the primary role of a firewall?

To protect networks and workstations by allowing or denying network traffic. The firewall does this using a configured set of rules.

Drag the information type on the left to the appropriate layer of the TCP/IP model it is associated with on the right.

Transport Layer ✓Segments Link Layer ✓Frames Application Layer ✓Data Internet Layer ✓Packets

Match the TCP/IP protocols with their functions.

Used to send email messages between mail servers. ✓SMTP Used to send messages to groups of users. ✓IGMP Used to assign IP addresses to hosts. ✓DHCP Used to get the MAC address of a host from its IP address. ✓ARP

Match the firewall types on the left with the characteristics shown on the right. (Firewall types may be used more than once.)

Usually, a software firewall ✓Host-based firewall Most robust and secure firewall ✓Network-based firewall Considered a hardware firewall ✓Network-based firewall Installed on a single computer ✓Host-based firewall Installed on the edge of a network ✓Network-based firewall Less robust and less customizable ✓Host-based firewall

You need to connect several network devices together using twisted pair Ethernet cables. Assuming Auto-MDIX is not enabled on these devices, drag the appropriate type of cabling on the left to each connection type on the right.

Workstation to switch ✓Straight-through Ethernet cable Router to switch ✓Straight-through Ethernet cable Switch to switch ✓Crossover Ethernet cable Workstation to router ✓Crossover Ethernet cable Router to router ✓Crossover Ethernet cable


संबंधित स्टडी सेट्स

Psychology Chapter 3 Objectives 1-16

View Set

And Then There Were None True or False

View Set

Chapter 10: Stockholders' Equity

View Set

ECON 2023 Resource Prices & Utilization (learnsmart)

View Set

PCOL Block 7: Laxatives and Antidiarrheal

View Set

Biology: Learning Outcomes (Week 1-4)

View Set

Exploring Psychology Ch12 - Personality

View Set