CS T2 M3
18. The figure below represents a network of physically linked devices, labeled A through H. A line between two devices indicates a connection. Devices can communicate only through the connections shown. What is the minimum number of connections that would need to be removed from the network in order for device A to not be able to communicate with device F?
A. 2
4. Which of the following best explains how IP addresses are assigned?
A. As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.
31. Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? Select two answers.
A. Better understanding of the effect of temporarily unavailable network connections D. Better understanding of the impact of increased connection speeds for frequently visited servers
20. Which of the following best describes the role of the Internet Engineering Task Force (IETF) ?
A. Developing standards and protocols for Internet communication
5. Which of the following best explains how data is typically assembled in packets for transmission over the Internet?
A. Each packet contains data to be transmitted, along with metadata containing information used for routing the data
14. The figure below represents a network of physically linked devices, labeled A through F. A line between two devices indicates a connection. Devices can communicate only through the connections shown.Which of the following statements are true about the ability for devices A and C to communicate? Select two answers.
A. If devices B and D were to fail, then information sent from device A could not reach device C. C. If devices D and F were to fail, then information sent from device A could not reach device C.
21. Which of the following is a primary benefit of making a computing system fault-tolerant?
A. If one component of the system fails, users of the system can often still access it.
35. Which of the following explains a benefit of using open standards and protocols for Internet communication?
A. Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.
10. A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?
A. The file is broken into packets for transmission. The packets must be reassembled upon receipt.
8. The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown.Which of the following statements best explains the ability of the network to provide fault tolerance?
A. The network is considered fault-tolerant because there are redundant paths between each pair of devices
22. According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
A. about.example.com
23. Which of the following best explains what happens when a new device is connected to the Internet?
B. An Internet Protocol (IP) address is assigned to the device.
26. Which of the following best explains how fault tolerance in a network is achieved?
B. By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component
25. The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices. What is the minimum number of connections that must be broken or removed before device B can no longer communicate with device C?
B. Four
16. The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers.Which of the following statements about security in the network is true? Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. Computers B and C can communicate with each other without additional computers being aware of the communication.
B. II only
7. Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?
B. IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.
28. Which of the following statements about the Internet is true?
B. The Internet is designed to scale to support an increasing number of users.
12. Which of the following best explains how the Internet is a fault-tolerant system?
B. The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.
34. Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?
B. The ability to provide data transmission even when some connections have failed
15. Which of the following best explains how messages are typically transmitted over the Internet?
B. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.
33. The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown. In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U?
B. Two
17. The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers.What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F?
C. 3
32. The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown. In which of the configurations is it possible to have redundant routing between devices Q and V?
C. Both configuration I and configuration II
6. Which of the following is a true statement about Internet communication?
C. Every device connected to the Internet is assigned an Internet protocol (IP) address.
30. Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale? A central monitoring computer is used to track and maintain the connections of the Internet. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections. Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way.
C. II and III only
24. The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices.Which of the following statements is true about the network?
C. If devices B and F fail, then device A will not be able to communicate with device G.
27. Which of the following best describes a direct benefit in using redundant routing on the Internet?
C. Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
1. Which of the following best describes the relationship between the World Wide Web and the Internet?
C. The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
3. Which of the following is a primary reason for the use of open protocols on the Internet?
D. Open protocols provide a way to standardize data transmission between different devices.
19. Which of the following best explains the relationship between the Internet and the World Wide Web?
D. The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
13. Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?
D. The computers can communicate directly because Internet communication uses standard protocols.
2. Which of the following best explains how data is transmitted on the Internet?
B.Data is broken into packets, which can be sent along different paths.
29. The following figures represent different ways of configuring a network of physically linked computers labeled P, Q, R, and S. A line between two computers indicates that the computers can communicate directly with each other. In which configuration is it NOT possible to have redundant routing between computers P and S?
B.
9. The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?
C. To establish a common standard for sending messages between devices on the Internet
11. A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?
D. Guest users will be restricted in the maximum amount of data that they can send and receive per second