My Personal Study - Volume 2

93 Questions | Attempts: 46
Share

SettingsSettingsSettings
My Personal Study - Volume 2 - Quiz

Questions and Answers
  • 1. 

    (201) What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?

    • A.

      A code set is established.

    • B.

      A word is created.

    • C.

      An octet is formed.

    • D.

      Nothing.

    Correct Answer
    A. A code set is established.
    Explanation
    If the sender and receiver arrange these bits in a preset sequence that is understood, a code set is established.

    Rate this question:

  • 2. 

    (201) How many possible symbols can 4 bits represent?

    • A.

      2.

    • B.

      4.

    • C.

      8.

    • D.

      16.

    Correct Answer
    D. 16.
    Explanation
    One bit can
    indicate only two possible messages. When a second bit is added, the number of possible messages increases to four (22). A further increase to 3 bits increases the possibilities to eight different choices (23). The number of bits (called X) available can have 2 to X possible combinations to represent information. For example, a code with 8 bits (28) can represent 256 possible messages or symbols. Generally 8 bits of data refers to a unit of data transmission known as a “byte.”

    Rate this question:

  • 3. 

    (202) In networking, a byte is identified as a/an

    • A.

      Bit.

    • B.

      Word.

    • C.

      Octet.

    • D.

      Letter.

    Correct Answer
    C. Octet.
    Explanation
    Normally bytes are 8 (binary) data bits in length. However, since some systems use bytes that are longer than 8 bits, generally, the term octet is used when referring to networking.

    Rate this question:

  • 4. 

    (203) What organization sets important computer networking wiring standards for residential and commercial network cabling?

    • A.

      Electronic Industries Alliance (EIA).

    • B.

      Telecommunications Industry Association (TIA).

    • C.

      The American National Standards Institute (ANSI).

    • D.

      The National Institute of Standards and Technology (NIST).

    Correct Answer
    A. Electronic Industries Alliance (EIA).
    Explanation
    An important computer networking function of the EIA is the series of standards for residential and commercial network cabling that are collectively known as the Electronic Industries Alliance/ Telecommunications Industry Association (EIA/TIA) wiring standards. Individuals and companies installing cabling for computer networks must follow these standards in order to comply with government safety and legal requirements.

    Rate this question:

  • 5. 

    (203) What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?

    • A.

      568A.

    • B.

      569A.

    • C.

      570A.

    • D.

      606A.

    Correct Answer
    A. 568A.
    Explanation
    EIA/TIA 570: Residential/Light Commercial Wiring Standard.
     EIA/TIA 568A& B: Commercial Building Telecommunications Cabling Standard.
     EIA/TIA 569: Commercial Building Standard for Telecommunications Pathways and Spaces.
     EIA/TIA 606: Design Guideline for Administration of Telecommunications Infrastructure.
     EIA/TIA 607: Commercial Building Grounding and Bonding Requirements for Telecommunications.

    Rate this question:

  • 6. 

    (204) Which of the following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?

    • A.

      E-carrier.

    • B.

      Structured query language.

    • C.

      International Organization for Standardization.

    • D.

      American Standard Code for Information Interchange.

    Correct Answer
    A. E-carrier.
    Explanation
    E-carrier is the digital telecommunications services backbone system of Europe–a format standardized by the International Telecommunication Union (ITU).

    Rate this question:

  • 7. 

    (204) There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      Institute of Electrical and Electronics Engineers (IEEE).

    • C.

      European Telecommunications Standards Institute (ETSI).

    • D.

      Internet Corporation for Assigned Names and Numbers (ICANN).

    Correct Answer
    B. Institute of Electrical and Electronics Engineers (IEEE).
    Explanation
    IEEE is a worldwide nonprofit association of technical professionals that promotes the development of standards and acts as a catalyst for new technology in all aspects of the engineering industry, including computer networking, telecommunications, electric power, aerospace, and consumer electronics.

    Rate this question:

  • 8. 

    (204) A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      Institute of Electrical and Electronics Engineers (IEEE).

    • C.

      European Telecommunications Standards Institute (ETSI).

    • D.

      Internet Corporation for Assigned Names and Numbers (ICANN).

    Correct Answer
    B. Institute of Electrical and Electronics Engineers (IEEE).
    Explanation
    A major contribution of the IEEE in the field of computer networking is Project 802; a collection of standards for local area network (LAN) architectures, protocols, and technologies. The 802 specifications define the operation of the physical network components—cabling, network adapters, and connectivity devices such as routers and switches.

    Rate this question:

  • 9. 

    (204) The “parent” organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      International Telecommunication Union (ITU).

    • C.

      Institute of Electrical and Electronics Engineers (IEEE).

    • D.

      International Telegraph and Telephone Consultative Committee (CCITT).

    Correct Answer
    B. International Telecommunication Union (ITU).
    Explanation
    The ITU is the “parent” organization for all other telecommunications organizations. ITU does not usually specify things itself, but merely coordinates the specification work of others.

    Rate this question:

  • 10. 

    (204) What organization is responsible for the X-series and V-series standards?

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      International Telecommunication Union (ITU).

    • C.

      Institute of Electrical and Electronics Engineers (IEEE).

    • D.

      International Telecommunication Union Telecommunications Standardization Sector (ITU-T).

    Correct Answer
    D. International Telecommunication Union Telecommunications Standardization Sector (ITU-T).
    Explanation
    The ITU-T is responsible for a number of important international networking and communication standards, including the following X and V series standards. Recommendations are drawn up by the ITU-T to establish communications interfaces for users’ data terminal equipment (DTE) and data communications equipment (DCE).

    Rate this question:

  • 11. 

    (204) Which series of standards are recommended for data transmission using the telephone network?

    • A.

      T.

    • B.

      V.

    • C.

      X.

    • D.

      Z.

    Correct Answer
    B. V.
    Explanation
    The V-series is a code designation used to list the recommendations for data transmission using the telephone network. Many of the recommendation designators deal with modems and data speeds.

    Rate this question:

  • 12. 

    (204) The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      International Telecommunication Union (ITU).

    • C.

      International Organization for Standardization (ISO).

    • D.

      Institute of Electrical and Electronics Engineers (IEEE).

    Correct Answer
    C. International Organization for Standardization (ISO).
    Explanation
    ISO’s major contribution to networking has been the definition of the OSI Reference Model, which is a layered architecture model for communication between open network systems.

    Rate this question:

  • 13. 

    (205) Within how many feet of the data communications equipment (DCE) connection does the Electronics Industries Alliance (EIA) RS–232–C standard prescribes bipolar-voltage serial data transmission?

    • A.

      25.

    • B.

      50.

    • C.

      100.

    • D.

      200.

    Correct Answer
    B. 50.
    Explanation
    The EIA RS–232–C standard prescribes bipolar-voltage serial data transmission within 50 feet of the DCE connection.

    Rate this question:

  • 14. 

    (205) Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?

    • A.

      RS–232–C.

    • B.

      RS–423.

    • C.

      RS–485.

    • D.

      RS–530.

    Correct Answer
    D. RS–530.
    Explanation
    The RS–530 is also based on a 25-pin connection (fig. 1–2). It works in either balanced or unbalanced electrical circuits.

    Rate this question:

  • 15. 

    (205) What transmission rates does Electronic Industries Alliance (EIA) RS–530 accommodate?

    • A.

      20 kilobits per second (Kbps) to 200 Kbps.

    • B.

      20 Kbps to 2 megabits per second (Mbps).

    • C.

      20 Kbps to 20 Mbps.

    • D.

      20 Kbps to 22 Mbps.

    Correct Answer
    B. 20 Kbps to 2 megabits per second (Mbps).
    Explanation
    The RS-530 accommodates data transmission rates from 20 Kbps to 2 Mbps; and its maximum distance depends on which electrical interface is used. (RS–530 is compatible with many interfaces, but the most popular standards include: RS–422–A, RS–423, V.35 and X.21).

    Rate this question:

  • 16. 

    (206) What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?

    • A.

      High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC).

    • B.

      Logical Link Control (LLC) and Media Access Control (MAC).

    • C.

      Data communications equipment (DCE) and data terminal equipment (DTE).

    • D.

      Electronic Industries Alliance (EIA) RS–232 and RS–530.

    Correct Answer
    B. Logical Link Control (LLC) and Media Access Control (MAC).
    Explanation
    The IEEE has subdivided the data link layer into two sublayers: LLC and media access control (MAC).
     The LLC sublayer of the data link layer manages communications between devices over a single link of a network. LLC is defined in the IEEE 802.2 specification and supports both connectionless and connection-oriented services used by higher-layer protocols. IEEE 802.2 defines a number of fields in data link layer frames that enable multiple higher-layer
    protocols to share a single physical data link.
     The MAC sublayer of the data link layer manages protocol access to the physical network medium. The IEEE MAC specification defines MAC addresses, which enable multiple devices to identify one another uniquely at the data link layer. Network interface cards used by computers have a MAC address and so do router network adapters/interfaces.

    Rate this question:

  • 17. 

    (206) At what Open System Interconnect (OSI) layer are common data compression and encryption schemes used?

    • A.

      Application.

    • B.

      Session.

    • C.

      Presentation.

    • D.

      Transport.

    Correct Answer
    C. Presentation.
    Explanation
    Presentation
    The presentation layer provides a variety of coding and conversion functions that are applied to application-layer data. These functions ensure that information sent from the application layer of one system will be readable by the application layer of another system. Some examples of presentation layer coding and conversion schemes include common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes.

    Rate this question:

  • 18. 

    (206) What Open System Interconnect (OSI) layer is closest to the end user?

    • A.

      Application.

    • B.

      Session.

    • C.

      Presentation.

    • D.

      Transport.

    Correct Answer
    A. Application.
    Explanation
    The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component.

    Rate this question:

  • 19. 

    (207) In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

    • A.

      Layer above.

    • B.

      Layer below.

    • C.

      Lowest layer.

    • D.

      Peer layer.

    Correct Answer
    C. Lowest layer.
    Explanation
    With the exception of the layers on each end, any layer in the OSI model communicates with three other OSI layers: the layer directly above it, the layer directly below it, and its peer layer in other networked devices.

    Rate this question:

  • 20. 

    (207) Which information unit, whose source and destination are network-layer entities, uses connectionless network service?

    • A.

      Frame.

    • B.

      Packet.

    • C.

      Segment.

    • D.

      Datagram.

    Correct Answer
    D. Datagram.
    Explanation
    Datagram
    The term datagram usually refers to an information unit whose source and destination are network layer entities that use connectionless network service.

    Rate this question:

  • 21. 

    (208) What data communication protocol is used to govern the flow and format of information between systems?

    • A.

      Character-oriented.

    • B.

      Bit-oriented.

    • C.

      Routing.

    • D.

      Network.

    Correct Answer
    A. Character-oriented.
    Explanation
    Character-oriented protocols (COP) use characters and symbols (character code set) to govern the flow and format of information between systems. COPs use a particular character code set for transmission, with some of the characters in the code set reserved for control functions. Two types of character code sets used are the ASCII and the EBCDIC. COPs can be further categorized as either asynchronous or binary-synchronous protocol.

    Rate this question:

  • 22. 

    (208) In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?

    • A.

      SEQ.

    • B.

      SYN.

    • C.

      STX.

    • D.

      EST.

    Correct Answer
    B. SYN.
    Explanation
    Character Meaning
    SYN Synchronizing character

    Functions
    Establishes and maintains character synchronization prior to the message block and during transmission. Also used as time fill in the absence of control characters and data.

    Rate this question:

  • 23. 

    (209) What data communication protocol is based on bits and the position of the bits?

    • A.

      Character-oriented.

    • B.

      Bit-oriented.

    • C.

      Routing.

    • D.

      Network.

    Correct Answer
    B. Bit-oriented.
    Explanation
    Whereas COPs are based on characters, bit-oriented protocols (BOP) are based on bits and the position of the bits. The most widely used BOPs in the industry are IBM’s SDLC and HDLC. Architecturally, BOP differs from COP in that it uses positional significance of the bits, not control characters. For example, in COP, a SOH is required after SYN is transmitted. SOH informs the receiver that a header is following soon after. In BOP, after the 8 synchronizing bits have been transmitted, the receiver knows that the next set of bits to follow is the header information.

    Rate this question:

  • 24. 

    (209) What data communication protocol ensures that the receiving station can distinguish information from garbage?

    • A.

      Asynchronous protocol.

    • B.

      Binary synchronous protocol.

    • C.

      Synchronous Data Link Control (SDLC).

    • D.

      High-Level Data Link Control (HDLC).

    Correct Answer
    D. High-Level Data Link Control (HDLC).
    Explanation
    High level data link control (HDLC) shares the same frame format and provides the same functionality as SDLC. Like SDLC, HDLC supports synchronous full-duplex operation. HDLC differs from SDLC in several minor ways. However, HDLC’s major difference over SDLC is that it ensures that the receiving station can distinguish information from garbage. It is necessary to have a way to handle situations where information might contain more than five straight 1-bits.

    Rate this question:

  • 25. 

    (210) A group of computers and associated devices that share a common communications line within a small geographic area is a

    • A.

      Metropolitan area network (MAN).

    • B.

      Local area network (LAN).

    • C.

      Wide area network (WAN).

    • D.

      Virtual private network (VPN).

    Correct Answer
    B. Local area network (LAN).
    Explanation
    Local area network
    A LAN is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually the server has applications and data storage that are shared by multiple computer users. A local area network may serve as few as two or three users or as many as thousands of users.

    Rate this question:

  • 26. 

    (210) The interconnection of several networks in a city into a single larger network is a

    • A.

      Local area network (LAN).

    • B.

      Wide area network (WAN).

    • C.

      Virtual private network (VPN).

    • D.

      Metropolitan area network (MAN).

    Correct Answer
    D. Metropolitan area network (MAN).
    Explanation
    Metropolitan area network
    A MAN is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large LAN but smaller than the area covered by a WAN. The term is applied to the interconnection of networks in a city into a single larger network. It is also the interconnection of several local area networks bridged together with backbone lines. The latter usage is also sometimes referred to as a campus network.

    Rate this question:

  • 27. 

    (210) What type of network connects networks that are typically separated by geographical distances?

    • A.

      Local area network (LAN).

    • B.

      Wide area network (WAN).

    • C.

      Virtual private network (VPN).

    • D.

      Metropolitan area network (MAN).

    Correct Answer
    B. Wide area network (WAN).
    Explanation
    Wide area network
    A WAN is a network that links LANs and MANs by using long-distance communication links that are leased or purchased from a telecommunications company. Long-distance communication links can be described as telephone lines, microwave, or satellite communications. A WAN connects networks that are typically separated by geographical distances. These distances are between two cities within a state, between two states, across a country, or around the world.

    Rate this question:

  • 28. 

    (210) What type of network enables a group of two or more computer systems to communicate over the public Internet?

    • A.

      Local area network (LAN).

    • B.

      Wide area network (WAN).

    • C.

      Virtual private network (VPN).

    • D.

      Metropolitan area network (MAN).

    Correct Answer
    C. Virtual private network (VPN).
    Explanation
    Virtual private network
    A virtual private network (VPN) provides a private tunnel through a public cloud (the internet). A VPN enables a group of two or more computer systems to communicate over the public internet. VPNs may exist between an individual machine and a private network, or a remote LAN and a private, enterprise network. Secure VPNs make use of tunneling and security protocols to maintain the privacy of data transactions over the Internet.

    Rate this question:

  • 29. 

    (211) Which type network enables users to share resources, files, and printers in a decentralized way?

    • A.

      Intranet.

    • B.

      Extranet.

    • C.

      Peer-to-peer.

    • D.

      Client-server.

    Correct Answer
    C. Peer-to-peer.
    Explanation
    Peer-to-peer
    Peer-to-peer networking enables users to share resources, files, and printers in a decentralized way. Specifically, peer-to-peer networks have the following characteristics:
     They allow users to share many resources on their computer, including files and printers.
     They are better for groups of 10 or fewer users.
     Decentralized so user files are not stored in a central location.
     They allow computers to communicate easily.

    Rate this question:

  • 30. 

    30. (212) What Network layer protocol provides information about how and where data should be delivered, including the data’s source and destination addresses?

    • A.

      Internet protocol (IP).

    • B.

      Address Resolution Protocol (ARP).

    • C.

      Reverse Address Resolution Protocol (RARP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    A. Internet protocol (IP).
    Explanation
    IP
    IP provides information about how and where data should be delivered, including the data’s source and destination addresses. IP is the protocol that enables the TCP/IP to internetwork—that is, to traverse more than one LAN segment and more than one type of network through a router. IP is a routed protocol.

    Rate this question:

  • 31. 

    (212) Which Network layer protocol matches a known internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

    • A.

      IP.

    • B.

      Address Resolution Protocol (ARP).

    • C.

      Reverse Address Resolution Protocol (RARP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    B. Address Resolution Protocol (ARP).
    Explanation
    Address resolution protocol
    While an IP address is necessary to route data between networks in the TCP/IP environment, the physical address, called the MAC address in an Ethernet network, is also necessary to provide intercommunication between devices. It is not always possible for a source device to know the physical address of the destination device.
    ARP provides the service of matching a known IP address for a destination device to a MAC address. ARP sends a MAC broadcast request to the entire destination network, asking for the MAC address of a particular known destination IP. The device that is identified by the IP address on the packet responds to the request, and replies by sending its MAC address. Thus, the source device is capable of correctly addressing communication packets without having to broadcast all messages and slow down the network.

    Rate this question:

  • 32. 

    (212) Which Network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?

    • A.

      IP.

    • B.

      Address Resolution Protocol (ARP).

    • C.

      Reverse Address Resolution Protocol (RARP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    C. Reverse Address Resolution Protocol (RARP).
    Explanation
    Reverse address resolution protocol
    The RARP provides the reverse of the ARP service. Rather than finding out the MAC address of a device whose IP address is already known, RARP provides the IP address for a device that knows its own MAC address. This service is typically needed in networks that use diskless workstations. These devices cannot maintain their own IP address in memory, but do have access to their MAC address. As a result, they must request an IP address to communicate.

    Rate this question:

  • 33. 

    (212) Which Transport layer protocol does not guarantee that packets will be received at all?

    • A.

      Internet protocol (IP).

    • B.

      User Datagram Protocol (UDP).

    • C.

      Transmission Control Protocol (TCP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    B. User Datagram Protocol (UDP).
    Explanation
    UDP
    UDP is a connectionless transport service. In other words, UDP offers no assurance that packets will be received in the correct sequence. In fact, this protocol does not guarantee that the packets will be received at all. Furthermore, it provides no error checking or sequencing.

    Rate this question:

  • 34. 

    (213) Which Application layer protocol is used to send and receive files by way of transmission control protocol/internet protocol (TCP/IP)?

    • A.

      File Transfer Protocol (FTP).

    • B.

      Trivial File Transfer Protocol (TFTP).

    • C.

      Simple Mail Transfer Protocol (SMTP).

    • D.

      Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. File Transfer Protocol (FTP).
    Explanation
    File transfer protocol (FTP) is used to send and receive files by way of TCP/IP.

    Rate this question:

  • 35. 

    (213) Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?

    • A.

      FTP.

    • B.

      Trivial File Transfer Protocol (TFTP).

    • C.

      Simple Mail Transfer Protocol (SMTP).

    • D.

      Hypertext Transfer Protocol (HTTP).

    Correct Answer
    B. Trivial File Transfer Protocol (TFTP).
    Explanation
    Trivial file transfer protocol (TFTP) is a protocol that enables file transfers between computers, but it is simpler (or more trivial) than FTP. A significant difference between FTP and TFTP is that TFTP relies on UDP at the Transport layer. Its use of UDP means that TFTP is connectionless and does not guarantee reliable data delivery.

    Rate this question:

  • 36. 

    (213) Which Application layer protocol is a terminal emulation used to log on to remote hosts?

    • A.

      Teletype Network.

    • B.

      Trivial File Transfer Protocol (TFTP).

    • C.

      Simple Mail Transfer Protocol (SMTP).

    • D.

      Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. Teletype Network.
    Explanation
    Teletype network
    Telnet is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite. Using Telnet, a TCP connection is established and keystrokes on the user’s machine act like keystrokes on the remotely connected machine. Often Telnet is used to connect two dissimilar
    systems (such as PCs and UNIX machines). Through Telnet, you can control a remote host over
    LANs and WANs such as the Internet.

    Rate this question:

  • 37. 

    (213) Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?

    • A.

      Dynamic Host Configuration Protocol (DHCP).

    • B.

      Trivial File Transfer Protocol (TFTP).

    • C.

      Simple Mail Transfer Protocol (SMTP).

    • D.

      Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. Dynamic Host Configuration Protocol (DHCP).
    Explanation
    Dynamic host configuration protocol (DHCP) is an automated means of assigning a unique IP address to every device on a network. It was developed by the Internet Engineering Task force (IETF). DHCP does not require the network administrator to maintain a table of IP and MAC addresses on the server. DHCP does require the network administrator in charge of IP address management to install and configure the DHCP service on a DHCP server.

    Rate this question:

  • 38. 

    (213) Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?

    • A.

      Dynamic Host Configuration Protocol (DHCP).

    • B.

      Network Time Protocol (NTP).

    • C.

      File Transfer Protocol (FTP).

    • D.

      Ping.

    Correct Answer
    D. Ping.
    Explanation
    Ping is a utility that can verify that TCP/IP is installed, bound to the network interface card (NIC), configured correctly, and communicating with the network. It is often employed simply to determine whether a host is responding (or “up”). Ping uses ICMP services to send echo request and echo reply messages that determine the validity of an IP address.

    Rate this question:

  • 39. 

    (214) The physical address of any device on the network is a/an

    • A.

      Internet protocol version 4 (IPv4) address.

    • B.

      Internet protocol version 6 (IPv6) address.

    • C.

      Static internet protocol (IP) address.

    • D.

      Media Access Control (MAC) address.

    Correct Answer
    D. Media Access Control (MAC) address.
    Explanation
    The first type of address is the Media Access Control (MAC) address. This is the physical address of any device—such as the NIC in a computer—on the network. The MAC address, which is made up of two equal parts, is 6 bytes long.

    Rate this question:

  • 40. 

    (214) What are the two parts to an Internet Protocol version 4 (IPv4) address?

    • A.

      Network and host.

    • B.

      Network and class.

    • C.

      Class and host.

    • D.

      Network and octet.

    Correct Answer
    A. Network and host.
    Explanation
    In an IPv4 address, the default number of bits used to identify the network and the host vary according to the network class of the address. The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the
    network. The Host section always contains the last octet.

    Rate this question:

  • 41. 

    (214) What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?

    • A.

      Subnet host.

    • B.

      Subnet network.

    • C.

      Subnet mask.

    • D.

      Host mask.

    Correct Answer
    C. Subnet mask.
    Explanation
    A computer on a TCP/IP network uses a subnet mask to determine what network it is on and whether a computer that it needs to send data to is located on a local network or on a remote network. For example, a Class C network with a default subnet mask of 255.255.255.0 indicates (by the three octets containing 255) that the network address is contained in the first three octets.

    Rate this question:

  • 42. 

    (215) How many subnet bits are required to support 90 subnets on a Class B network?

    • A.

      Three.

    • B.

      Five.

    • C.

      Seven.

    • D.

      Nine.

    Correct Answer
    C. Seven.
    Explanation
    Consider how many subnet bits are required to support 90 subnets. Therefore, seven bits are required for subnetting. 2^6 = 64

    Rate this question:

  • 43. 

    (215) How many bits are available for host bits on a Class B network using seven bits?

    • A.

      Three.

    • B.

      Five.

    • C.

      Seven.

    • D.

      Nine.

    Correct Answer
    D. Nine.
    Explanation
    Consider how many subnet bits are required to support 90 subnets. Therefore, seven bits are required for subnetting.
    2^6 = 64
    2^7 = 128
    This leaves nine bits for hosts; hence, ample address space is available for the maximum number of hosts per submit.2^9 - ^2 = 510. This results in the following mask:

    Rate this question:

  • 44. 

    (216) What is not a recommendation for planning networks using variable length subnet masking (VLSM)?

    • A.

      Start with the shortest mask.

    • B.

      Re-address the entire network.

    • C.

      Aim to use contiguous subnets where possible.

    • D.

      Choose one or more available subnets and subnet further.

    Correct Answer
    B. Re-address the entire network.
    Explanation
    A number of points are worth emphasizing in relation to VLSM:
     Start with the shortest mask. Plan the subnets that support the most hosts. This is typically the mask used on most or all of the LAN segments.
     Choose one or more available subnets and subnet further. This is sometimes called “subnetting the subnets.” It is important to remember that this can be done only with one or more subnets that have not already been used up.
     Aim to use contiguous subnets where possible. Although it is not essential, it certainly makes very good sense to choose a continuous range of addresses and apply a particular mask to them. The advantage of this type of consistency is that it can be determined from the third octet address that this is a LAN segment and also that the mask is 24-bit.

    Rate this question:

  • 45. 

    (217) What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?

    • A.

      Auto-sense.

    • B.

      Auto negotiation.

    • C.

      Auto configuration.

    • D.

      Auto summarization.

    Correct Answer
    C. Auto configuration.
    Explanation
    A problem with a 32 hexadecimal address is assigning them correctly; it’s easy to mistype a character. IPv6 uses dynamic host configuration protocol (DHCP) similar to IPv4 but there’s another option to acquire an IPv6 address, and it is called autoconfiguration. In autoconfiguration, the host appends the prefix information of its closest router to its own unique hardware or media access control (MAC) address to make up the IPv6 address, making it easier to allocate addresses.

    Rate this question:

  • 46. 

    (218) Which one of the following is not an Internet protocol version 6 (IPv6) transition approach?

    • A.

      Translation.

    • B.

      Tunneling.

    • C.

      Dual stack.

    • D.

      Auto configuration.

    Correct Answer
    D. Auto configuration.
    Explanation
    IPv6 is underway, but transitioning fully from IPv4 will take a long time. There may be IPv6 network infrastructures out there that do not need IPv4 interoperability and the following mechanism will not be used. However, in an environment where IPv4 and IPv6 resources need to interoperate, Dual-Stack, IPv6 Tunneling and Translation, are the initial set of IPv6 transition mechanisms as specified in RFC 2893.

    Rate this question:

  • 47. 

    (218) Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue?

    • A.

      6to4.

    • B.

      Teredo.

    • C.

      Tunnel Broker.

    • D.

      Intra-Site Automatic Tunnel Addressing Protocol (ISATAP).

    Correct Answer
    B. Teredo.
    Explanation
    An address assignment and automatic tunneling technology that provides unicast IPv6 connectivity across the IPv4 Internet. Teredo attempts to solve the lack of functionality issue 6to4 has with Network Address Translation (NAT).
    Tunneling from the hosts presents an issue for NAT: IPv6 packets that are encapsulated within IPv4 have the Protocol field in the IPv4 header set to 41.

    Rate this question:

  • 48. 

    (218) Teredo has four tunneling components. Which one is not one of them?

    • A.

      Teredo host-specific relay.

    • B.

      Teredo client.

    • C.

      Teredo server.

    • D.

      Teredo agent.

    Correct Answer
    D. Teredo agent.
    Explanation
    Teredo has four components for tunneling:
    Teredo client, Teredo server, Teredo relay and Teredo host-specific relay.

    Rate this question:

  • 49. 

    (219) The combination transmitter/receiver device, in a single package, is called a

    • A.

      Transceiver.

    • B.

      Repeater.

    • C.

      Router.

    • D.

      Hub.

    Correct Answer
    A. Transceiver.
    Explanation
    In general, a transceiver is a combination transmitter/receiver in a single package. The term can be applied to wireless communications devices such as cellular telephones, cordless telephones, handheld two-way radios and mobile two-way radios.

    Rate this question:

  • 50. 

    (220) What device provides the physical, electrical, and electronic connections to the network media?

    • A.

      Bridge.

    • B.

      Router.

    • C.

      Gateway.

    • D.

      Network interface card (NIC).

    Correct Answer
    D. Network interface card (NIC).
    Explanation
    The network interface card (NIC), as its name suggests, is an expansion card you install in your computer to connect, or interface, your computer to the network. The NICs can be viewed as the actual interface between workstations, servers, clients, and the shared media of the network. These devices provide the physical, electrical, and electronic connections to the network media. A NIC is either an expansion card (the most popular implementation) or built into the motherboard of the
    computer. In most cases, a NIC connects to the computer through expansion slots, which are special slots located on a computer’s motherboard that allow peripherals to be plugged directly into it.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 02, 2011
    Quiz Created by
    Ricktheguru
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.