What transport layer protocol does TFTP use.. Which of the following protocols operate at the TCP/IP Internet layer.. How does the network layer forward packets from the source to the de
Trang 12. What is the maximum distance for thick Ethernet without using a repeater?
C 500m (1640.4 ft.)
3. 10-Mbps Ethernet operates within the timing limits offered by a series of no
repeaters
C Five, four
4. Fast Ethernet supports up to what transfer rate?
C 100 Mbps
5. Identify two Gigabit Ethernet cable specifications
C 1000BASE-SX
D 1000BASE-LX
D Short-wave laser over multimode fiber
7. 4D-PAM5 encoding method is used in which of the following Gigabit Ethernet?
C 1000BASE-T
8. What is the IEEE standard for 10-Gb Ethernet?
C 802.3ae
9. Which of the following is not a feature of microsegmentation?
D It increases collisions.
10. Which of the following is used by LAN switches for making the forwarding
decision?
B MAC address
11. Which of the following is a feature of full-duplex transmission?
D All of the above.
Answer: store-and-forward, cut-through, and fragment-free
13. The Spanning-Tree Protocol allows which of the following?
B A redundant network path without suffering the effects of loops in the network
Trang 214. Which of the following is not one of the STP port states?
D Transmitting
15. Which of the following is true concerning a bridge and its forwarding decisions?
C Bridges operate at OSI Layer 2 and use MAC addresses to make decisions.
16. Which of the following is not a feature of bridges?
C They do not make any forwarding decisions.
17. Which of the following statements is true of microsegmentation?
A Each workstation gets its own dedicated segment through the network.
18. Which of the following is true for LAN switches?
B They are very high-speed multiport bridges.
Chapter 7
1. What transport layer protocol does TFTP use?
C UDP
2. Which of the following is a basic service of the transport layer?
D All of the above
3. Which of the following protocols operate at the TCP/IP Internet layer?
D All of the above
4. What is the first thing that happens when a DHCP client boots?
C DHCPDISCOVER
5. How does the network layer forward packets from the source to the destination?
A By using a routing table
6. If a device doesn’t know the MAC address of a device on an adjacent network, it sends an ARP request to what?
D All of the above
7. What is in a RARP request?
A A MAC header and the RARP request message
Trang 38. What are the two parts of an IP address?
A Network address and host address
9. What Internet protocol is used to map a known IP address to an unknown MAC
address?
C ARP
10. Which of the following initiates an ARP request?
D A device that cannot locate the destination MAC address in its ARP table
11. Which of the following best describes an ARP table?
D A section of RAM on each device that maps IP addresses to MAC addresses
12. Which of the following best describes the ARP reply?
A A device sends its MAC address to a source in response to an ARP request
13. Why are current, updated ARP tables important?
B For limiting the number of broadcasts
A A source knows its MAC address but not its IP address.
15. Which of the following best describes TCP/IP?
A It is a suite of protocols that can be used to communicate across any set of interconnected networks.
16. Which of the following does not describe the TCP/IP protocol stack?
A It maps closely to the OSI reference model’s upper layers.
17. The TCP/IP protocol suite has specifications for which layers of the OSI model?
C 3, 4, and 5 through 7
18. Which of the following is not a function of the network layer?
D UDP provides connectionless exchange of datagrams without acknowledgments.
19. Which of the following is one of the protocols found at the transport layer?
B UDP
Trang 4Chapter 8
1. How many bits are in an IP address?
B 32
2. What is the maximum value of each octet in an IP address?
B 255
3. The network number plays what part in an IP address?
A It specifies the network to which the host belongs.
4. The host number plays what part in an IP address?
B It designates which node on the subnetwork is being addressed.
5. What is the decimal equivalent of the binary number 101101?
C 45
6. Convert the decimal number 192.5.34.11 to its binary form
A 11000000.00000101.00100010.00001011
7. Convert the binary IP address 11000000.00000101.00100010.00001011 to its decimal form
D None of the above
8. What portion of the Class B address 154.19.2.7 is the network address?
B 154.19
9. What portion of the IP address 129.219.51.18 represents the network?
A 129.219
10. Which of the following addresses is an example of a broadcast address on the network 123.10.0.0 with a subnet mask of 255.255.0.0?
B 123.10.255.255
11. How many host addresses can be used in a Class C network?
B 254
12. How many subnets can a Class B network have?
D None of the above
13. What is the minimum number of bits that can be borrowed to form a subnet?
B 2
Trang 514. What is the primary reason for using subnets?
C To reduce the size of the broadcast domain
15. How many bits are in a subnet mask?
B 32
16. Performing the Boolean function as a router would on the IP addresses 131.8.2.5
and 255.0.0.0, what is the network/subnetwork address?
D None of the above
17. How many bits can be borrowed to create a subnet for a Class C network?
C 6
18. With a Class C address of 197.15.22.31 and a subnet mask of 255.255.255.224,
how many bits have been borrowed to create a subnet?
C 3
19. Performing the Boolean function as a router would on the IP addresses
172.16.2.120 and 255.255.255.0, what is the subnet address?
C 172.16.2.0
20. Which of the following best describes one function of Layer 3, the network layer,
in the OSI model?
C It determines which is the best path for traffic to take through the network.
21. What function allows routers to evaluate available routes to a destination and to
establish the preferred handling of a packet?
B Path determination
22. How does the network layer forward packets from the source to the destination?
A By using an IP routing table
23. What are the two parts of a network layer address that routers use to forward
traffic through a network?
A Network address and host address
Trang 6Chapter 9
1. When conversing with an individual whose primary language is different than yours, you might need to repeat your words and speak more slowly Repeating
A Reliability; flow control
2. The following characteristics describe what TCP/IP protocol: connection-oriented; resends anything not received; divides outgoing messages into segments
B TCP
3. What does the window field in a TCP segment indicate?
D Number of octets that the device is willing to accept
4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery?
A UDP
5. What do TCP and UDP use to keep track of different conversations crossing a network at the same time?
A Port numbers
6. How does TCP synchronize a connection between the source and the destination before data transmission?
B Three-way handshake
7. Which range of port numbers is unregulated?
D Above 1023
8. With TCP transmission, what occurs if a segment is not acknowledged in a certain time period?
D Retransmission occurs.
9. Which best describes flow control?
C A method of preventing buffer overrun
10. Which of the following best describes the purpose of the TCP/IP protocol stack?
C Transfers information from one host to another in a sequence of datagrams
Trang 711. Which of the following is one of the protocols found in the transport layer?
B UDP
12. What is the purpose of port numbers?
A They keep track of different upper-layer conversations crossing the network
at the same time.
13. Why are TCP three-way handshake/open connections used? Select all that apply
A To ensure that lost data can be recovered if problems occur later
B To determine how much data the receiving station can accept at one time
C It allows the window size to be negotiated dynamically during the TCP session, which results in more efficient use of bandwidth.
15. UDP segments use what protocols to provide reliability?
B Application layer protocols
D None of the above
A E-mail
B The requestor of services
19. Which of the following best describes a domain name?
A It represents the numeric address of an Internet site.
20. com is the domain typically assigned to
D Corporations
21. During a Telnet connection, the remote computer is responsible for
B Processing
22. At which three layers of the OSI model does Telnet primarily work?
D Application layer, presentation layer, session layer
Trang 823. Typical anonymous FTP sessions use as the login ID and
as the password
A Anonymous; the user e-mail address
24. Instead of working with specific application programs, redirectors work with
A Computer operating systems
Chapter 10
1. Which of the following best describes a WAN?
A Connects LANs that are separated by a large geographic area
A WANs emphasize access over serial interfaces operating at lower speeds.
3. Which of the following are examples of WAN technologies?
B Frame Relay, ISDN
4. Which layers of the OSI model do WAN standards describe?
D Physical and data link
5. Which best describes data circuit-terminating equipment (DCE)?
D Consists of physical devices at the end of a WAN connection
6. Which of the following components provides interface voice-grade services, channel service units/digital service units (CSUs/DSUs) that interface T1/E1 services, and terminal adapters/Network Termination 1 (TAs/NT1s) that interface Integrated Services Digital Network (ISDN) services?
C Modems
7. Which of the following concentrates the dial-in and dial-out user connections?
D Communication servers
8. Some WAN physical and data link layer standards are:
D All of the above
Trang 99. Match the functions with the components.
C. ROM
E. Interface Options:
A. RAM that retains its contents when a unit is powered off
B. Volatile memory that can be read and written by the microprocessor
C. Volatile memory that can be read but not written by a microprocessor
D. Nonvolatile storage that can be electrically erased and reprogrammed so that software images can be stored, booted, and rewritten as necessary
E. Connection between two systems or devices
D 1-b, 2-a, 3-c, 4-d, 5-e
10. Any internetwork will probably include the following:
D All of the above
11. Which of the following are data link encapsulations for WAN?
D All of the above
12. What are the main functions of routers?
D Both A and B
13. Which is an IBM-designed WAN data link for Systems Network Architecture
(SNA) environments, largely being replaced by the more versatile HDLC?
C Synchronous Data Link Control Protocol
14. Which WAN data link protocol is used for signaling and call setup on an ISDN D
channel?
A LAPD
15. Identify the WAN circuit-switched service(s):
D Both A and C
Trang 1016. Which service has become an extremely popular WAN technology in its own right, is more efficient than X.25 but with similar services, has a maximum band-width of 44.736 Mbps, and offers extremely popular 56-Kbps and 384-Kbps implementations in the United States?
A Frame Relay
17. Identify the cell-switched technology/technologies:
D Both A and B
18. Identify the common type(s) of DSL technology/technologies:
D All of the above
19. Which is a family of very high-speed physical layer technologies with a series of data rates available with special designations, implemented at different Optical Carrier (OC) levels ranging from 51.84 Mbps (OC-1) to 9952 Mbps (OC-192), that can achieve these amazing data rates by using wavelength division multi-plexing (WDM)?
A SONET
20. Which are the kind of routers that form the primary paths for traffic that is sourced from and destined to other networks?
C Backbone routers
Chapter 11
1. A router initializes by doing which of the following?
C Loading the bootstrap, the setup procedure, and the operating system
2. During the setup process in a router, what keys can be used to escape the sequence?
C Ctrl + c
3. Match the configuration setting on the right with the items on the left that are needed to establish a HyperTerminal session: