Networking Test Chapters 6-10

Ace your homework & exams now with Quizwiz!

Which three IP addresses are private? (Choose three.) 172.168.33.1 10.35.66.70 192.168.99.5 172.18.88.90 192.33.55.89 172.35.16.5

10.35.66.70 192.168.99.5 172.18.88.90

What is the network address of the host 172.25.67.99 /23 in binary? 10101100. 00011001.01000011.00000000 10101100. 00011001.01000011.11111111 10101100. 00011001.01000010.00000000 10101100. 00011001.01000010.01100011 10101100. 00010001.01000011. 01100010 10101100. 00011001.00000000.00000000

10101100. 00011001.01000010.00000000

A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong? 172.16.0.0 172.16.192.0 172.16.192.128 172.16.192.160 172.16.192.168 172.16.192.176

172.16.192.160

Which IPv4 subnetted addresses represent valid host addresses? (Choose three.) 172.16.4.127 /26 172.16.4.155 /26 172.16.4.193 /26 172.16.4.95 /27 172.16.4.159 /27 172.16.4.207 /27

172.16.4.155 /26 172.16.4.193 /26 172.16.4.207 /27

How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0? 30 256 2046 2048 4094 4096

2046

What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts? 255.255.0.0 255.255.255.0 255.255.254.0 255.255.248.0

255.255.255.0

Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork? 255.255.0.0 255.255.255.0 255.255.254.0 255.255.248.0

255.255.255.0

A company is planning to subnet its network for a maximum of 27 hosts. Which subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet? 255.255.255.0 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248

255.255.255.224

How many bits make up an IPv4 address? 128 64 48 32

32

Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame? A random delay is used to ensure a collision-free link. A random delay value for each device is assigned by the manufacturer. A standard delay value could not be agreed upon among networking device vendors. A random delay helps prevent the stations from experiencing another collision during the transmission.

A random delay helps prevent the stations from experiencing another collision during the transmission.

Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below. 85 90 BA A1 B3 1C

BA

Which of the following is a drawback of the CSMA/CD access method? Collisions can decrease network performance. It is more complex than non-deterministic protocols. Deterministic media access protocols slow network performance. CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies.

Collisions can decrease network performance.

Which statements describe the logical token-passing topology? (Choose two.) Network usage is on a first come, first serve basis. Computers are allowed to transmit data only when they possess a token. Data from a host is received by all other hosts. Electronic tokens are passed sequentially to each other. Token passing networks have problems with high collision rates.

Computers are allowed to transmit data only when they possess a token. Electronic tokens are passed sequentially to each other.

Which three types of connectors are commonly associated with Cisco's V.35 serial cables? (Choose three.) RJ 11 DB 60 Winchester 15 pin DB 9 smart serial RJ 45

DB 60 Winchester 15 pin smart serial

What is a possible effect of improperly applying a connector to a network cable? Data will be forwarded to the wrong node. Data transmitted through that cable may experience signal loss. An improper signaling method will be implemented for data transmitted on that cable. The encoding method for data sent on that cable will change to compensate for the improper connection

Data transmitted through that cable may experience signal loss,

What is true regarding media access control? (Choose three.) Ethernet utilizes CSMA/CD defined as placement of data frames on the media contention-based access is also known as deterministic 802.11 utilizes CSMA/CD Data Link layer protocols define the rules for access to different media controlled access contains data collisions

Ethernet utilizes CSMA/CD defined as placement of data frames on the media Data Link layer protocols define the rules for access to different media

Host A has an IP address of 172.16.225.93 and a mask of 255.255.248.0. Host A needs to communicate with a new host whose IP is 172.16.231.78. Host A performs the ANDing operation on the destination address. What two things will occur? (Choose two.) Host A will change the destination IP to the IP of the nearest router and forward the packet. Host A will broadcast an ARP request for the MAC of its default gateway. A result of 172.16.225.0 will be obtained. Host A will broadcast an ARP request for the MAC of the destination host. A result of 172.16.224.0 will be obtained. A result of 172.16.225.255 will be obtained.

Host A will broadcast an ARP request for the MAC of the destination host. A result of 172.16.225.255 will be obtained.

In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do? Host B can transmit immediately since it is connected on its own cable segment. Host B must wait to receive a CSMA transmission from the hub, to signal its turn. Host B must send a request signal to Host A by transmitting an interframe gap. Host B must wait until it is certain that Host A has completed sending its frame.

Host B must wait until it is certain that Host A has completed sending its frame.

Which characteristics describe fiber optic cable? (Choose two.) It is not affected by EMI or RFI. Each pair of cables is wrapped in metallic foil. It combines the technique of cancellation, shielding and twisting to protect data. It has a maximum speed of 100 Mbps. It is the most expensive type of LAN cabling.

It is not affected by EMI or RFI It is the most expensive type of LAN cabling.

What statements are true regarding addresses found at each layer of the OSI model? (Choose two.) Layer 2 may identify devices by a physical address burned into the network card Layer 2 identifies the applications that are communicating Layer 3 represents a hierarchical addressing scheme Layer 4 directs communication to the proper destination network Layer 4 addresses are used by intermediary devices to forward data

Layer 2 may identify devices by a physical address burned into the network card Layer 3 represents a hierarchical addressing scheme

What does the IEEE 802.2 standard represent in Ethernet technologies? MAC sublayer Physical layer Logical Link Control sublayer Network layer

Logical Link

What is true concerning physical and logical topologies? The logical topology is always the same as the physical topology. Physical topologies are concerned with how a network transfers frames. Physical signal paths are defined by Data Link layer protocols. Logical topologies consist of virtual connections between nodes.

Logical topologies consist of virtual connections between nodes.

Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer? LLC MAC HDLC NIC

MAC

An installed fiber run can be checked for faults, integrity, and the performance of the media by using what device? light injector OTDR TDR multimeter

OTDR

Ethernet operates at which layers of the OSI model? (Choose two.) Network layer Transport layer Physical layer Application layer Session layer Data-link layer

Physical layer Data-link layer

Which statements are true regarding IP addressing? (Choose two.) NAT translates public addresses to private addresses destined for the Internet. Only one company is allowed to use a specific private network address space. Private addresses are blocked from public Internet by router. Network 172.32.0.0 is part of the private address space. IP address 127.0.0.1 can be used for a host to direct traffic to itself.

Private addresses are blocked from public Internet by router. IP address 127.0.0.1 can be used for a host to direct traffic to itself.

What two facts are true when a device is moved from one network or subnet to another? (Choose two.) The Layer 2 address must be reassigned. The default gateway address should not be changed. The device will still operate at the same Layer 2 address. Applications and services will need additional port numbers assigned. The Layer 3 address must be reassigned to allow communications to the new network.

The device will still operate at the same Layer 2 address. The Layer 3 address must be reassigned to allow communications to the new network.

When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired? The hosts return to a listen-before-transmit mode. The hosts creating the collision have priority to send data. The hosts creating the collision retransmit the last 16 frames. The hosts extend their delay period to allow for rapid transmission.

The hosts return to a listen-before-transmit mode.

What is a characteristic of a logical point-to-point topology? The nodes are physically connected. The physical arrangement of the nodes is restricted. The media access control protocol can be very simple. The data link layer protocol used over the link requires a large frame header.

The media access control protocol can be very simple.

What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.) The router will discard the packet. The router will decrement the TTL value and forward the packet to the next router on the path to the destination host. The router will send a time exceeded message to the source host. The router will increment the TTL value and forward the packet to the next router on the path to the destination host. The router will send an ICMP Redirect Message to the source host.

The router will discard the packet. The router will send a time exceeded message to the source host.

A customer installs a wireless access point at home in the closet next to the kitchen. The customer mentions that the wireless communication performance seems degraded when the cordless phone or the microwave oven is in use. What is the possible reason for this degradation? The access point is close to walls. The cordless phone joins the WLAN and shares the available bandwidth. The wireless signal is in the same radio frequency range as the household devices are in. The access point is on the same electrical circuit as the phone base unit and microwave oven are. The surge of electricity when a microwave oven is in use disrupts the operation of the access point.

The wireless signal is in the same radio frequency range as the household devices are in.

What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.) They are 48 binary bits in length. They are considered physical addresses. They are generally represented in hexadecimal format. They consist of four eight-bit octets of binary numbers. They are used to determine the data path through the network. They must be changed when an Ethernet device is added or moved within the network.

They are 48 binary bits in length. They are considered physical addresses. They are generally represented in hexadecimal format.

Which three statements are true about the role of routers in the network? (Choose three.) They propagate broadcasts. They enlarge collision domains. They segment broadcast domains. They interconnect different network technologies. Each router interface requires a separate network or subnet. They maintain a common frame format between LAN and WAN interfaces.

They segment broadcast domains. They interconnect different network technologies. Each router interface requires a separate network or subnet.

Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address? This is a useable host address. This is a broadcast address. This is a network address. This is not a valid address.

This is a network address.

A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre-existing building with limited cabling space. Which type of media would best meet these requirements? STP UTP coaxial single-mode fiber multi mode fiber

UTP

Which data communications standard provides broadband access in a wireless network? GSM Wi-Fi WiMAX Bluetooth

WiMAX

What is a group of hosts called that have identical bit patterns in the high order bits of their addresses? an internet a network an octet a radi

a network

What three primary functions does data link layer encapsulation provide? (Choose three.) addressing error detection frame delimiting port identification path determination IP address resolution

addressing error detection frame delimiting

After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data? the device involved in the collision with the lowest MAC address the device involved in the collision with the lowest IP address any device in the collision domain whose backoff timer expires first those that began transmitting at the same time

any device in the collision domain whose backoff timer expires first

Which type of cable run is most often associated with fiber-optic cable? backbone cable horizontal cable patch cable work area cable

backbone cable

Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask? binary adding hexadecimal anding binary division binary multiplication binary ANDing

binary ANDing

What are three common methods for setting a UTP Ethernet port to MDI or MDIX operation? (Choose three.) direct configuration of the device cable color code association cable selection and configuration use of cable testers to determine pinouts the enabling of the mechanism to electrically swap the transmit and receive pairs the automatic detection and negotiating of MDI/MDIX operation of the port

cable color code association the enabling of the mechanism to electrically swap the transmit and receive pairs the automatic detection and negotiating of MDI/MDIX operation of the port

Which option identifies the primary interface which would be used for initial configuration of a Cisco router? AUX interface Ethernet interface serial interface console interface

console interface

Which statements correctly describe MAC addresses? (Choose three.) dynamically assigned copied into RAM during system startup layer 3 address contains a 3 byte OUI 6 bytes long 32 bits long

copied into RAM during system startup contains a 3 byte OUI 6 bytes long

What are the two most commonly used media types in Ethernet networks today? (Choose two.) coaxial thicknet copper UTP coaxial thinnet optical fiber shielded twisted pair

copper UTP optical fiber

What is the primary reason for development of IPv6? security header format simplification expanded addressing capabilities addressing simplification

expanded addressing capabilities

What is a primary purpose of encapsulating packets into frames? provide routes across the internetwork format the data for presentation to the user facilitate the entry and exit of data on media identify the services to which transported data is associated

facilitate the entry and exit of data on media

In LAN installations where potential electrical hazards or electromagnetic interference may be present, what type of media is recommended for backbone cabling? coax fiber Cat5e UTP Cat6 UTP STP

fiber

When is a rollover cable used in a network? for connecting a host to a Fast Ethernet port on a switch for connecting a router to another router for connecting two routers through their AUX ports for connecting to a switch through its console port

for connecting to a switch through its console port

Which of the following is a characteristic of single-mode fiber-optic cable? generally uses LEDs as the light source relatively larger core with multiple light paths less expensive than multimode generally uses lasers as the light source

generally uses lasers as the light source

What are three measures of data transfer? (Choose three.) goodput frequency amplitude throughput crosstalk bandwidth

goodput throughput bandwith

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) greater distances per cable run lower installation cost limited susceptibility to EMI/RFI durable connections greater bandwidth potential easily terminated

greater distances per cable run limited susceptibility to EMI/RFI greater bandwidth potential

What are three functions of the upper data link sublayer in the OSI model? (Choose three.) recognizes streams of bits identifies the network layer protocol makes the connection with the upper layers identifies the source and destination applications insulates network layer protocols from changes in physical equipment determines the source of a transmission when multiple devices are transmitting

identifies the network layer protocol makes the connection with the upper layers insulates network layer protocols from changes in physical equipment

What three facts are true about the network portion of an IPv4 address? (Choose three.) identifies an individual device is identical for all hosts in a broadcast domain is altered as packet is forwarded varies in length is used to forward packets uses flat addressing

is identical for all hosts in a broadcast domain varies in length is used to forward packets

What is the purpose of the preamble in an Ethernet frame? is used as a pad for data identifies the source address identifies the destination address marks the end of timing information is used for timing synchronization with alternating patterns of ones and zeros

is used for timing synchronization with alternating patterns of ones and zeros

Which of the following are features of IPv6? (Choose three.) larger address space faster routing protocols data types and classes of service authentication and encryption improved host naming conventions same addressing scheme as IPv4

larger address space data types and classes of service authentication and encryption

What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device

loss of signal strength as distance increases

What determines the method of media access control? (Choose two.) network layer addressing media sharing application processes logical topology intermediary device function

media sharing logical topology

Which two features make switches preferable to hubs in Ethernet-based networks? (Choose two.) reduction in cross-talk minimizing of collisions support for UTP cabling division into broadcast domains increase in the throughput of communications

minimizing of collisions increase in the throughput of communications

Ethernet operates at which layer of the TCP/IP network model? application physical transport internet data link network access

network access

Which options are properties of contention-based media access for a shared media? (Choose three.) non-deterministic less overhead one station transmits at a time collisions exist devices must wait their turn token passing

non-deterministic less overhead collisions exist

Which OSI layer is responsible for managing optical signals used for data communication? presentation data link transport physical

physical

A network administrator has been asked to provide a graphic representation of exactly where the company network wiring and equipment are located in the building. What is this type of drawing? logical topology physical topology cable path wiring grid access topology

physical topology

What is a function of the data link layer? provides the formatting of data provides end-to-end delivery of data between hosts provides delivery of data between two applications provides for the exchange data over a common local media

provides for the exchange data over a common local media

What is the primary purpose of ARP? translate URLs to IP addresses resolve IPv4 addresses to MAC addresses provide dynamic IP configuration to network devices convert internal private addresses to external public addresses

resolve IPv4 addresses to MAC addresses

What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable

rollover

To establish a console connection from a computer to a Cisco router, which cable wiring option would be used? crossover cable straight through cable rollover cable V.35 cable

rollover cable

Which device is used to create or divide broadcast domains? hub switch bridge router repeater

router

Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.) LAN workstations servers network printers routers remote workstations laptops

servers network printers routers

What is the primary purpose of the trailer in a data link layer frame? define the logical topology provide media access control support frame error detection carry routing information for the frame

support frame error detection

What are two common methods for setting a UTP Ethernet port to MDI or MDIX operation? (Choose two.) cable color code association cable selection and configuration use of cable testers to determine pinouts the automatic detection and negotiating of MDI/MDIX operation of the port the enabling of the mechanism to electrically swap the transmit and receive pairs

the automatic detection and negotiating of MDI/MDIX operation of the port the enabling of the mechanism to electrically swap the transmit and receive pairs

Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.) the Layer 3 protocol selected the geographic scope of the network the PDU defined by the transport layer the physical layer implementation the number of hosts to be interconnected

the geographic scope of the network the physical layer implementation the number of hosts to be interconnected

With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs? the magnetic field around the adjacent pairs of wire the use of braided wire to shield the adjacent wire pairs the reflection of the electrical wave back from the far end of the cable the collision caused by two nodes trying to use the media simultaneously

the magnetic field around the adjacent pairs of wire

Compared with UTP cable, what extra characteristic of STP cable helps reduce the effects of interference? the metal braiding in the shielding the reflective cladding around the core the twisting of the wires in the cable the insulating material in the outer jacket

the metal braiding in the shielding

Which of the following describe interframe spacing? (Choose two.) the minimum interval, measured in bit-times, that any station must wait before sending another frame the maximum interval, measured in bit-times, that any station must wait before sending another frame the 96-bit payload padding inserted into a frame to achieve a legal frame size the 96-bit frame padding transmitted between frames to achieve proper synchronization the time allowed for slow stations to process a frame and prepare for the next frame the maximum interval within which a station must send another frame to avoid being considered unreachable

the minimum interval, measured in bit-times, that any station must wait before sending another frame the time allowed for slow stations to process a frame and prepare for the next frame

What is a purpose of the physical layer in data communication? to wrap data packets into frames to make sure that MAC addresses are unique in each frame to control the access sequence of frames to the transmission media to convert a frame into a series of signals to be transmitted on the local media

to convert a frame into a series of signals to be transmitted on the local media


Related study sets

Chapter 14 Terms - FIN 301: Principles of Finance

View Set

PrepU Chapter 40: Musculoskeletal Care, CH 40, Safety

View Set

Chapter 8: Contraception and Abortion

View Set

Cryptography: Electronic Signatures

View Set

10 - Performance Management and Feedback

View Set

Operating System and File Management

View Set