NETWORKING INTRODUCTION QUESTIONS. 1. You are the network administrator for an organization. You boot up a router,...

60.1K

Verified Solution

Question

Programming

NETWORKING INTRODUCTION QUESTIONS.

1. You are the network administrator for an organization. Youboot up a router, log into it, and issue a series of commands thatchanges the IP address of one of the interfaces. Which of thefollowing statements is true? (Choose 2)

  • a. The running config file and startup config file are nolonger identical.
  • b. The iOS image has been altered.
  • c. The changes to the configuration are automatically saved toNVRAM.
  • d. The startup config file has been altered.
  • e. The running config file has been altered.

2. What are two characteristics of fiber-optic cable?(Choose two.)

  • a. Each fiber strand carries an electrical impulse in a singledirection.
  • b. It is more difficult to terminate than copper.
  • c. Each bundle contains 4 twisted pairs.
  • d. It is not affected by EMI/RFI.
  • e. It uses cross cancellation to protect againstinterference.

3. Which statements are true regarding physical layer standards?(Choose 2)

  • a. They are defined by the IETF.
  • b. They are developed in part by the EIA/TIA.
  • c. They include electronics and media.
  • d. They are performed in software.

4. How long are the source and destination IP addresses?

  • a. The length will vary depending on the medium carrying thepacket.
  • b. 64 bits.
  • c. 32 bits.
  • d. 128 bits.
  • e. 32 bytes.

5. Physical layer standards define all of the followingexcept?

  • a. Voltage.
  • b. Encoding.
  • c. Congestion.
  • d. Media.
  • e. Bandwidth.

6. You are receiving a file using a TCP protocol. During thethree way handshake the computers agreed to a 10,000 byte window.What will happen if only 5000 bytes are acknowledged?

  • a. The destination will reduce the window size.
  • b. The sender will reduce the window size.
  • c. The sender will acknowledge 5000.
  • d. The destination will not acknowledge until the lost 5000 isretransmitted.

7. You are a network administrator of a small company that isupgrading its existing IP network. Currently the network utilizesUTP to the desktops. You wish to upgrade to fiber multi-mode to thedesktops. What changes do you need to make to the IP settings ofthe devices in the network?

  • a. Migrate to IPv6 as only IPv4 does not support fiber.
  • b. Increase the TTL settings.
  • c. Decrease the TTL settings.
  • d. No changes to IP settings are required.

8. You are a network administrator for an organizations. One ofthe end users complains that her PC cannot access any website. Youinvestigate and find that the PC cannot communicate with any otherdevice. You suspect the problem lies with the TCP/IP protocol stackon the host. What command will test whether this is theproblem?

  • a. Ping 127.0.0.1
  • b. Ping 0.0.0.0
  • c. Ping [IP address of default gateway]
  • d. Ping 1.1.1.1
  • e. Loopback 127.0.0.1

9. Why is media access control required for Ethernet?

  • a. To avoid overwhelming a destination NIC card.
  • b. To retransmit a segment if it is lost.
  • c. To provide a mechanism for one host to use a shared media ifno other host is using it.
  • d. To manage who’s turn it is to communicate on a sharedmedia.

10. Which is true about the HTTP protocol?

  • a. It is a request response protocol.
  • b. It sends secure request across the network.
  • c. It uses SSL.
  • d. It uses the GET message to upload resources to the web.

11. Ethernet uses what access method?

  • a. Priority sharing
  • b. CSMA/CA
  • c. Token passing
  • d. CSMA/CD

12. Which UTP cable is used to connect a switch port to aPC?

  • a. Rollover
  • b. Console
  • c. Straight-through
  • d. Crossover

13. Which is true regarding DHCP services?

  • a. The DCHP request follows the DHCP offer.
  • b. The first step in DHCP is the host sending a DHCPrequest.
  • c. DHCPACK lets the server know that the host accepted theoffer.
  • d. If two DHCP servers exists on the same network you might geta DHCPACK from both.

14. Which is not true regarding emailprotocols?

  • a. A host uses the POP protocol to communicate directly withanother email client.
  • b. Mail servers uses SMTP to communicate with each other.
  • c. Mail clients connect to their server using port 25.
  • d. If the destination server is not available, the sendingemail servers spool the message and tries again later.

15. Bandwidth is measured in all of the followingexcept___________?

  • a. Mega Bytes per second.
  • b. bits per second.
  • c. kilo bits per second.
  • d. Gb/s d Tb/s

16. You are receiving a VOIP call. What transport layer featureallows the receiving data to stay live?

  • a. Permeant circuit (session)
  • b. Connection oriented
  • c. Low overhead
  • d. Reliable delivery

17. You open multiple browsers on a single PC to access awebsite. The web server sends a reply to the request from one ofthe web browsers. Which information is used by the TCP/IP protocolstack in the PC to identify which of the web browsers shouldreceive the reply?

  • a. The source layer 3 address.
  • b. The destination layer 3 address.
  • c. The source port number.
  • d. The destination port number.

18. What is encapsulated around a packet at layer 2?(Choose 2)

  • a. Data.
  • b. Trailer.
  • c. Header.
  • d. Bits.

You could answer with the letters or type it out per question. Iappreciate it.

Answer & Explanation Solved by verified expert
4.4 Ratings (1037 Votes)
Answer 1 c The changes to the configuration are automatically saved to NVRAM e The running config file has been altered Answer 2 c Each bundle contains 4 twisted pairs    See Answer
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students