Networking Questions with Answers PDF

Document Details

StimulatingCanyon

Uploaded by StimulatingCanyon

Tags

networking questions network protocols computer networking internet technologies

Summary

This document contains a set of networking questions and answers, covering topics like network basics, IP addressing, wireless technologies, and troubleshooting.

Full Transcript

***PAGE 1*** **1. A basic unit of information that represents one of two discrete states is known as a:** Bit (short for "binary digit"). 2. A byte consists of how many bits? 8 bits. 3. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent? The pack...

***PAGE 1*** **1. A basic unit of information that represents one of two discrete states is known as a:** Bit (short for "binary digit"). 2. A byte consists of how many bits? 8 bits. 3. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent? The packet will be sent directly to the destination host using its MAC address. **4. A computer that has software installed to provide information such as email or web pages to other devices is known as a:** Server. 5. A console cable is also referred to by what other name? Roll-over cable. 6. A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used? NFC (Near Field Communication). **7. A default route is the interface through which the router forwards:** Packets destined for networks that are not directly connected. 8. A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why? 192.168.25.10 is a private IP address and cannot be used over the public internet. 9. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? DSL (Digital Subscriber Line). 10. A host is transmitting a broadcast. Which host or hosts will receive it? All hosts on the local network. 11. A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information? DHCP Offer. **12. A host will send a packet to the default gateway when:** The destination IP address is outside its local network. 13. A message is sent to all hosts on a remote network. Which type of message is it? Broadcast. 14. A network administrator in a small office is upgrading the local network within the building. New network cables are needed to connect office computers and networking devices. Which network media should the administrator use? Cat 5e or Cat 6 Ethernet cables (Twisted-pair cables). 15. A network technician is extending the network from the main office building over several hundred meters to a new security station. The security station needs a high-speed connection to support video surveillance of the main building. What type of cable is best suited to connect the security station to the rest of the main office network? Fiber optic cable. **16. A network where two computers are communicating with each other as both a client and as a server is known as a:** Peer-to-peer network. 17. A PC is configured with both an IPv4 and IPv6 address on the same network adapter. What IPv4 and IPv6 coexistence strategy is implemented on the PC? Dual-stack. 18. A salesperson is using a smartphone map application to locate a business. What wireless technology enables the smartphone to receive satellite geolocation information for the map application? GPS (Global Positioning System). 19. A smart phone uses web browser software to request and display a web page. The smart phone is considered what type of computer? Client. 20. A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address? The computer could not obtain an IP address from a DHCP server, so it automatically assigned itself a link-local address (169.254.x.x). 21. A student purchased a new Wi-Fi-enabled tablet computer. What is required to connect this device to the internet? A Wi-Fi router connected to the internet. 22. A user is looking for a wireless headphone for listening to songs stored on a smartphone. What wireless technology would the headphone use? Bluetooth. 23. A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices? Wireless router. 24. A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this? Link-local address. 25. Allan contacts the ISP complaining of issues connecting to the internet. He is unsure of the problem. The ISP sends a new preconfigured modem to Allan in hopes that it solves the situation. Which structured troubleshooting method is the ISP using? Replace method. **26. An ARP request is sent out as:** A broadcast. 27. An Ethernet MAC address is considered what type of address? A hardware (or physical) address. 28. An IP address is considered what type of address? A logical address. 29. As Rory continues to study Ethernet, he discovers that a frame can typically be 64 to 1518 bytes of information that is converted into a series of bits before being sent out on the network. Which protocol characteristic did Rory learn about for Ethernet? Frame size. 30. Assume a host with IP address 10.1.1.10 wants to request web services from a server at 10.1.1.254. Which of the following would display the correct socket pair? **10.1.1.10:** source_port → 10.1.1.254:80 (where port 80 is typically used for HTTP). 31. Bianka, a Polish traveler in Hanoi, Vietnam, stops and asks Nguyệt for directions to the Ngoc Son Temple. They verbally communicate and determine that they both speak English. After receiving directions in English to the temple, Bianka repeats them to Nguyệt. Nguyệt says, "Yes, that is correct." Select the order of the communications protocols used in this scenario? Application layer (language) → Presentation layer (interpretation) → Application layer (confirmation). 32. Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Security. 33. Consider the group of five IPv4 addresses each with the subnet mask of 255.255.255.0. Which IPv4 address belong to the same local network? Addresses with the same network portion (first 24 bits) are on the same local network. 34. Eilert recently got a job with a computer support services company in his hometown of Falun, Sweden. A customer has asked for someone to come connect their home network to the internet. They only have a cable modem. Which of the following intermediary devices would Eilert most likely take with him to the job? Wireless router (for home network connectivity and internet access). **35. Ethernet hubs are considered:** Layer 1 devices (physical layer). 36. Ethernet switches add entries to their MAC address table based on what field of the Ethernet frame? Destination MAC address. 37. Ethernet switches make their forwarding decision based on what field of the Ethernet frame? Destination MAC address. 38. For two hosts that are on the same network, which of the following statement is true? They can communicate directly using MAC addresses. 39. For two hosts, each on a different network, which of the following statement is true? They must use a router to communicate. 40. Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? Reliability. 41. Host-A has an Ethernet frame to send to Host-B on the same network. Host-A knows the IP address of Host-B but not its MAC address. What message will Host-A send to determine the MAC address of Host B? ARP request. 42. Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. What is the network address of Host-A? 10.5.4.0. 43. Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. Which of the following IPv4 address would be on the same network as Host-A? 10.5.4.50. 44. Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. What is the network address of Host-A? 172.16.0.0. 45. Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. Which of the following IPv4 address would be on the same network as Host-A? 172.16.5.50. 46. Host-A has the IPv4 address and subnet mask 192.168.1.50 255.255.255.0. Which of the following IPv4 address would be on the same network as Host-A? 192.168.1.100. 47. Host-A sends an ARP request and receives an ARP reply from Host-B. What is in the ARP reply that Host-A did not know and needs to communicate with Host-B? The MAC address of Host-B. **48. Host-B receives an ARP request. Host-B will return an ARP Reply if:** It recognizes the request is for its own IP address. 49. How large are IPv4 addresses? 32 bits. 50. How many binary bits exist within an IPv6 address? 128 bits. ***PAGE 2*** 1. How many bits make up an IPv4 address? 32 bits 2. How many exchanges are needed to end both sessions between two hosts? Four exchanges (a four-way handshake) 3. How many octets exist in an IPv4 address? 4 octets 4. How many unique values are possible using a single binary digit? 2 unique values (0 and 1) 5. How much data can be encapsulated into a normal-sized Ethernet frame before it is sent over the network? 1500 bytes (payload) 6. If more than one DHCP server is available on the local network, in which order will DHCP messages be sent between a host and a DHCP server? Discover → Offer → Request → Acknowledgment (DORA process) 7. If the default gateway is configured incorrectly on a host, what is the impact on communications? The host will not be able to communicate outside its local network. 8. If your physical connection is working as expected, but there is still a problem, what would be the next step? Check the IP configuration and network settings. 9. In the context of mobile devices, what does the term tethering involve? Sharing a mobile device's internet connection with other devices. 10. IP addressing occurs at what layer of the OSI Model? Layer 3 (Network Layer) 11. IPv6 increases the IP address size from 32 bits to how many bits? 128 bits 12. Which end device is Marjani most likely to use to connect to the internet from her rural farm? Satellite modem 13. What troubleshooting method is Medhat using? Layered troubleshooting (top-down or bottom-up approach depending on test results) 14. What troubleshooting method is Patti using? Experience-based troubleshooting **15. Reasons to divide a network into multiple smaller networks:** (a) Improve performance (b) Increase security 16. What protocol characteristic is Rory investigating? Frame structure or encapsulation 17. What media type does Rosalía most likely use? Cellular network 18. What is the capacity of the medium to carry data known as? Bandwidth 19. What type of addresses does a home wireless router provide using DHCP? Private IP addresses 20. What is the destination MAC address of an Ethernet broadcast in hexadecimal? **FF:** FF:FF:FF:FF:FF 21. At what layer of the OSI Model is the Ethernet protocol? Layer 2 (Data Link Layer) 22. What are IETF internet standards recorded in? RFCs (Request for Comments) 23. What technology is required to enable computers on different logical networks to communicate? Routing or VLANs with a router 24. What layer does the physical layer pass bits up to? Layer 2 (Data Link Layer) 25. What is the process of prepending protocol information called? Encapsulation 26. What are network communication rules known as? Protocols 27. Which protocol is used to send email from a client to a mail server? SMTP (Simple Mail Transfer Protocol) 28. What is a route known as a gateway of last resort? Default route 29. To what type of address are ICMPv6 neighbor solicitation messages sent? Solicited-node multicast address 30. Which device is typically used for NAT in a corporate environment? Router or Firewall 31. What does a router do if it does not find a route to the destination network? Drops the packet 32. What does a router do with a frame with a broadcast MAC address? Floods it to all ports except the source port 33. What addresses are mapped by ARP? IPv4 addresses to MAC addresses 34. What information is recorded by a switch in its MAC address table? Source MAC address and corresponding port 35. What allows digital devices to interconnect and transmit data? Networks or protocols **36. Two methods used to provide internet connectivity on a mobile device:** (a) Wi-Fi (b) Cellular data 37. What can be placed in or on a package to track it? RFID tag or barcode 38. What can allow visitor devices to connect to a wireless network while restricting their access? Guest network 39. What command can refresh your IP addressing configuration? ipconfig /renew (Windows) 40. What criterion must IPv4 addressing follow for end devices? Unique address within the network 41. What data representation is used during processing? Binary 42. What destination MAC address is used for communication with a remote network? Default gateway's MAC address 43. What destination MAC address is used for same local network communication? Destination device's MAC address 44. What device dedicates all resources to one service? Server 45. What does a code of “O” in the routing table indicate? OSPF route **46. What does a double colon (:** :) represent in IPv6? Consecutive groups of zeros 47. What field reassembles segments into order? Sequence number 48. What field provides flow control? Window size 49. What function is provided by ARP? Resolves IPv4 addresses to MAC addresses ***PAGE 3*** **Here are the answers to all the questions:** 1. What happens when a sending host senses there is congestion? The host slows down its transmission rate, typically by reducing the congestion window size or retransmitting data after a delay. 2. What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? The destination MAC address is examined to determine the appropriate outgoing port. 3. What information in the IP packet does the router use to determine which interface to forward the packet? The destination IP address is used to forward packets. 4. What information may be requested when pairing devices over Bluetooth? PIN codes, device names, and pairing confirmation are typically requested. 5. What is a benefit of adding a router within an IP network? It improves network segmentation, traffic management, and security by separating broadcast domains. 6. What is a characteristic of a peer-to-peer application? Each device can act as both a client and a server, sharing resources directly without centralized control. 7. What is a function of the MAC sublayer? It manages access to the physical medium and controls how devices on a network gain access to the medium. 8. What is a service that provides an internet data signal on the same network that delivers broadcast television and phone service? Cable broadband provides internet, TV, and phone services on the same network. 9. What is a service that provides high bandwidth, always-on connection using existing land-line telephone wires? DSL (Digital Subscriber Line) provides this service. 10. What is an advantage of the peer-to-peer network model? It is cost-effective and does not require dedicated servers. 11. What is an advantage of using IPv6? It provides a larger address space and improved efficiency in routing. 12. What is an attack using ARP? ARP spoofing or ARP poisoning, where an attacker sends fake ARP messages to associate their MAC address with the target's IP address. 13. What is an example of a binary value from everyday life? A light switch (on/off) represents binary states (1 and 0). 14. What is an internet service that uses mobile phone networks to transmit data? Mobile broadband or cellular data (e.g., 4G, 5G). 15. What is another term for the internet port of a wireless router? The WAN port. 16. What is NOT considered a physical layer problem? Incorrect IP addressing is not a physical layer issue. 17. What is one advantage of using DHCP to assign addresses to mobile devices? It allows for automatic and dynamic IP address allocation as devices join the network. 18. What is one advantage of using fiber optic cabling rather than copper cabling? Higher bandwidth and longer transmission distances. 19. What is one factor increasing the adoption of IPv6 network addresses? The exhaustion of IPv4 addresses. 20. What is one function of a Layer 2 switch? Forwarding frames based on the MAC address table. 21. What is one function of the ARP protocol? Resolving an IP address to a MAC address. 22. What is one reason for subnetting an IP network? To improve network efficiency and security by reducing broadcast domains. 23. Why is DHCP the preferred method of assigning IP addresses to hosts on large networks? It simplifies management and reduces configuration errors. 24. What is routing? The process of forwarding packets across networks based on their destination IP address. 25. What is the command used on a Cisco IOS router to view the routing table? show ip route. 26. What is the common media used in networks? Twisted pair cables, fiber optic cables, and wireless media. 27. What is the correct order for the messages in DHCP operation? Discover, Offer, Request, Acknowledge (DORA). 28. What is the default SSID Broadcast setting on a wireless router? Enabled by default. 29. What is the destination IP address when an IPv4 host sends a DHCPDISCOVER message? 255.255.255.255 (broadcast address). 30. What is the feature of IPv4 addresses? 32-bit binary address represented in dotted decimal format. 31. What is the function of end devices on a network? To send and receive data. 32. What is the function of MAC addresses in a LAN? To provide a unique identifier for devices for local communication. 33. What is the internet? A global network of interconnected networks. 34. What is the method that can be used to shorten the IPv6 address notation? **Omitting leading zeros and using double colons (:** :) for consecutive zeros. 35. What is the most common type of wired media used by TV companies to connect and carry signals to a set-top box within a home? Coaxial cable. 36. What are the most commonly referenced fields in an IPv4 packet header? Source IP address and Destination IP address. 37. What is the most important motivating factor for moving to IPv6? Address exhaustion in IPv4. 38. What is the most likely cause if you are able to ping multiple sites on the internet but cannot open web pages? A DNS issue. 39. What is the network number for an IPv4 address 172.16.34.10 with the subnet mask of 255.255.255.0? 172.16.34.0. 40. What is the order of bandwidth measurement from smallest to largest? Kbps, Mbps, Gbps, Tbps. 41. What is the primary advantage of using NAT? It allows multiple devices to share a single public IP address. 42. What is the purpose of configuring a default gateway address on a host? To enable communication with devices on different networks. 43. What is the purpose of NAT? To translate private IP addresses to a public IP address for internet access. 44. What is the purpose of protocols in data communications? To establish rules and standards for data exchange. 45. What is the purpose of the FCS field in a frame? To verify the integrity of the data using error checking. 46. What is the purpose of the OSI physical layer? To define the hardware specifications for data transmission. 47. What is the purpose of the subnet mask in conjunction with an IP address? To determine the network and host portions of the address. 48. What is the purpose of using twisted pairs of wires in an Ethernet cable? To reduce electromagnetic interference (EMI) and crosstalk. 49. What are the reasons a network administrator might want to create subnets? To improve security, manageability, and performance by reducing broadcast domains. 50. What is the recommended prefix length for most IPv6 subnets? /64. ***PAGE 4*** **Here are answers to all your questions:** 1. What is the role of IANA? The Internet Assigned Numbers Authority (IANA) is responsible for managing IP address allocation, DNS root zone management, and protocol assignments. 2. What is the term for splitting up an IP packet when forwarding it from one medium to another medium with a smaller MTU? Fragmentation. **3. What is the valid most compressed format possible of the IPv6 address 2001:** 0DB8:0000:AB00:0000:0000:0000:1234? **2001:** DB8:0:AB00::1234. 4. What is used to identify a specific wireless network? The SSID (Service Set Identifier). 5. What kind of physical networks are commonly used in WANs? Fiber optic cables, leased lines, satellite links, and cellular networks. 6. What measurement is used to indicate thousands of bits per second? Kbps (Kilobits per second). 7. What networking term describes a particular set of rules at one layer that govern communication at that layer? Protocol. 8. What PDU is received by the physical layer for encoding and transmission? Bits. 9. What piece of information is required when manually connecting either an iOS device or an Android device to a secured wireless network? The network security key (password). 10. What process is used to place one message inside another message for transfer from the source to the destination? Encapsulation. 11. What protocol is responsible for automatically assigning IP addressing information? DHCP (Dynamic Host Configuration Protocol). 12. What purpose would a home user have for implementing Wi-Fi? To provide wireless internet access to devices in their home. 13. What radio frequency band is used in home Wireless LANs? 2.4 GHz and 5 GHz. 14. What role does a router play on a network? A router connects different networks, directs packets, and provides NAT functionality. 15. What statement describes a characteristic of MAC addresses? MAC addresses are unique to each device and are hardcoded into the network interface card (NIC). 16. What technology enables a cell phone to be used as a hands-free device? Bluetooth. 17. What term is used to describe connecting a mobile device to another mobile device or computer to share a network connection? Tethering. 18. What type of device is able to create physical movement? Actuator. 19. What type of device is commonly connected to the Ethernet switch ports on a home wireless router? Wired devices like computers, printers, or gaming consoles. 20. What type of internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity? Satellite internet. 21. What type of IPv6 address begins with fe80? Link-local address. 22. What type of network allows computers in a home office or a remote office to connect to a corporate network? VPN (Virtual Private Network). 23. What type of network is defined by two computers that can both send and receive requests for resources? Peer-to-peer network. 24. What type of network must a home user access in order to do online shopping? The internet. 25. What was the reason for the creation and implementation of IPv6? To address the IPv4 address exhaustion problem. 26. What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address? The host will discard the frame. 27. What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? The switch will flood the frame out all ports except the port it was received on. 28. What wireless router configuration would stop outsiders from using your home network? Enabling WPA3/WPA2 security with a strong password. **29. When a switch receives an Ethernet frame and the destination MAC address of that frame is not in its MAC address table, the switch will:** Flood the frame to all ports except the incoming port. **30. When an Ethernet frame is sent out an interface, the destination MAC address indicates:** The intended recipient of the frame. **31. When an Ethernet switch receives a frame that is broadcast, it will:** Forward the frame out all ports except the incoming port. 32. When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? Interoperability. 33. When first connecting to a switch to configure it for the first time, you should answer "no" to the initial dialog question. After answering "no," what is the prompt? Switch> (user EXEC mode). 34. When IPv4 is configured for a computer on a network, what does the subnet mask identify? The network and host portions of an IP address. 35. When the IETF began development of IPv6, what was the goal of implementing this technology? To provide a larger address space, improved security, and better efficiency in routing. **36. When using your credit card to make purchases at several places, the credit card company can use this information to learn about your location and your preferences. This type of personal data is known as:** Metadata. 37. Where is the ARP table stored on a device? In the device’s RAM. 38. Which access control method requires the destination to send an acknowledgment so that the sender knows the frame arrived? CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). 39. Which address does not change when a device is connected to a new network? The MAC address. 40. Which address prefix range is reserved for IPv4 multicast? 224.0.0.0 to 239.255.255.255. 41. Which address should be configured as the default gateway address of a client device? The IP address of the router’s LAN interface. 42. Which application protocol is used to automatically configure IP addressing information? DHCP (Dynamic Host Configuration Protocol). 43. Which application protocol is used to resolve web addresses to an IP address? DNS (Domain Name System). 44. Which application protocols are used by clients to retrieve email messages? IMAP (Internet Message Access Protocol) and POP3 (Post Office Protocol 3). 45. Which application would use the TCP transport layer protocol? Web browsing (HTTP/HTTPS). 46. Which application would use the UDP transport layer protocol? Streaming video/audio or online gaming. 47. Which category of network components includes wires and cables used in a wired network? Network media. 48. Which characteristic describes the default gateway of a host computer? It is the IP address of the router that forwards traffic to external networks. 49. Which cloud model is used to meet the needs of a specific industry, such as healthcare or media? Community cloud. 50. Which cloud model represents two or more clouds where each part remains a distinctive object, but both are connected? Hybrid cloud. ***PAGE 5*** **Here are the answers to your questions:** **1. Command to view IPv4 and IPv6 routing table on a Windows host:** route print **2. Command to view the ARP table on a Cisco router:** show ip arp **3. Command to return to the privileged EXEC prompt on a Cisco router:** end or Ctrl+Z **4. Control bit flags used during the three-way handshake:** SYN and ACK **5. Criterion for selecting appropriate network media:** Bandwidth, distance, and environmental factors (such as interference) **6. Data encoding technology used in fiber-optic cables:** Light encoding (e.g., binary encoding using pulses of light) **7. Data link sublayer controlling network interface through software drivers:** Media Access Control (MAC) **8. Data link sublayer working with upper layers to add application information:** Logical Link Control (LLC) **9. Default gateway statement that is true:** The default gateway is used to route packets destined for networks outside the local network. **10. Delivery method that doesn't guarantee packet delivery without errors:** Unreliable delivery (e.g., UDP) **11. Design layer providing connectivity to devices on an Ethernet LAN:** Access layer **12. Destination address used in an ARP request frame:** **Broadcast address (FF:** FF:FF:FF:FF:FF) **13. Destination IPv4 address used by a DHCPv4 client to send the initial Discover packet:** 255.255.255.255 (broadcast address) **14. End device:** Devices like computers, printers, and smartphones (devices that use the network to communicate) **15. Intermediary device:** Routers, switches, firewalls, etc. **16. Device used to transfer data from one IP local network to a remote network:** Router **17. Devices that do not forward an IPv4 broadcast packet by default:** Routers **18. DHCPv4 message sent by a client to accept an offered IP address:** DHCP Request **19. Duplex communication method used in WLANs:** Half-duplex **20. Ethernet frame field indicating the beginning of a frame:** Preamble **21. Characteristic of MAC filtering in wireless networks:** Allows only devices with approved MAC addresses to connect **22. Field containing common values like ICMP (1), TCP (6), UDP (17):** Protocol field (in the IPv4 header) **23. Field the same in TCP and UDP header:** Source and destination ports **24. Field used to detect corruption in the IPv4 header:** Header checksum **25. ICMPv6 message used in SLAAC:** Router Advertisement (RA) **26. ICMPv6 message used to determine the MAC address of a known IPv6 address:** Neighbor Solicitation (NS) **27. Information used by a switch to keep its MAC address table current:** Source MAC address and incoming port **28. Information used by a switch to populate the MAC address table:** The source MAC address of incoming frames **29. Information used by routers to forward data packets:** Destination IP address **30. IOS mode allowing access to all commands and features:** Privileged EXEC mode **31. IOS mode if the Switch(config)# prompt is displayed:** Global Configuration mode **32. IOS mode if the Switch> prompt is displayed:** User EXEC mode **33. Private IP address:** Any IP address in the range of 10.0.0.0–10.255.255.255, 172.16.0.0–172.31.255.255, or 192.168.0.0–192.168.255.255 **34. Valid IPv6 address notation:** **Example:** 2001:0db8:85a3:0000:0000:8a2e:0370:7334 **35. Characteristic of static routes:** Manually configured and do not change unless modified by an administrator **36. Characteristic of the network SSID:** Identifies a wireless network **37. Feature of IMAP:** Allows access to email messages stored on a mail server **38. Binary equivalent of 192.168.11.10:** 11000000.10101000.00001011.00001010 **39. Decimal equivalent of A9:** 169 **40. Hexadecimal equivalent of 202:** CA **41. Hexadecimal equivalent of 254:** FE **42. Most common type of wired media to connect end devices to an Ethernet LAN:** Twisted pair cable (e.g., Cat 5e, Cat 6) **43. Transport layer responsibility:** Ensures reliable data transfer, flow control, and error checking (TCP/UDP) **44. True statement of the IPv6 header:** IPv6 has a fixed-length header of 40 bytes. **45. True statement of the IPv6 packet header:** IPv6 does not have a checksum field. **46. Items collectively referred to as network media:** Copper cables, fiber optics, wireless signals **47. LAN topology with all end systems chained to each other and terminated at the end:** Bus topology **48. Hybrid LAN topology:** Star-bus or star-ring topology **49. Layer responsible for establishing temporary communication sessions between source and destination applications:** Session layer **50. Layer responsible for preparing IP packets for transmission over the communications medium:** Data Link layer ***PAGE 6*** **Here are the answers to your questions:** **1. Layer of the OSI model that defines services to segment and reassemble data for individual communications:** Transport layer **2. Layer of the TCP/IP model responsible for ensuring packets are sent reliably and any missing packets are resent:** Transport layer (specifically TCP) **3. Hexadecimal value of the decimal number 15:** F **4. Media access control methods that are contention-based:** CSMA/CD (Carrier Sense Multiple Access with Collision Detection) and CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) **5. Media that uses electrical pulses to represent bits:** Copper cables (e.g., Ethernet cables) **6. Media that uses patterns of light to represent bits:** Fiber-optic cables **7. Media that uses patterns of microwaves to represent bits:** Wireless radio waves or satellite communication **8. Message an IPv4 host uses to reply when it receives a DHCPOFFER message from a DHCP server:** DHCP Request **9. Method used to directly connect mobile devices to a data network:** Wi-Fi or cellular data networks (e.g., 4G, 5G) **10. Network device that can serve as a boundary to divide a Layer 2 broadcast domain:** Switch **11. Network device that sends data to a specific destination based on the MAC address table:** Switch **12. Network migration technique encapsulating IPv6 packets inside IPv4 packets:** Tunneling (e.g., 6to4, Teredo) **13. Device that attaches antennas to wireless devices and can be bundled with fiber-optic cabling:** Access Point (AP) **14. Best description of DHCP:** Dynamic Host Configuration Protocol (DHCP) is used to automatically assign IP addresses to devices on a network. **15. Counter to EMI and RFI using shielding techniques and special connectors:** STP (Shielded Twisted Pair) cable **16. Device used to divide a network into smaller networks:** Router **17. DNS record type used to resolve IPv6 addresses:** AAAA (IPv6 Address) record **18. DNS resource record type that resolves authoritative name servers:** NS (Name Server) record **19. Fiber-optic cable type that can help data travel approximately 500 meters:** Multimode fiber (OM2 or OM3) **20. Fiber-optic cable type that can travel approximately 100 km:** Single-mode fiber **21. Fiber-optic cable type used to connect long-distance telephony and cable TV applications:** Single-mode fiber **22. Fiber-optic cable type used within a campus network:** Multimode fiber (OM3 or OM4) **23. Fiber-optic cable type that uses lasers in a single stream as a data light source:** Single-mode fiber **24. Fiber-optic cable type that uses light emitting diodes (LEDs) as a data light source:** Multimode fiber **25. Low-power, shorter range wireless technology intended to replace wired connectivity for accessories:** Bluetooth **26. Stateless best-effort delivery transport layer protocol:** UDP (User Datagram Protocol) **27. Wireless communication technology enabling a smartphone to communicate with a payment system within a few centimeters away:** NFC (Near Field Communication) **28. Displayed by the nslookup utility:** DNS (Domain Name System) information, including IP address resolution and domain name queries **29. NOT a criterion for choosing a network media:** Transmission speed (although it's a consideration, environmental factors, distance, and cost are typically more important) **30. Binary equivalent of the 172.16.31.30 IP address:** 10101100.00010000.00011111.00011110 **31. Decimal equivalent of 7D:** 125 **32. Most common network media:** Twisted-pair cables (e.g., Cat 5e, Cat 6) **33. Used to connect a wired device to the internal switch of the home router:** Ethernet cable (e.g., Cat 5e or Cat 6) **34. Wired high-speed Internet connection:** Fiber-optic, DSL, or Cable broadband **35. Measurements including any latency encountered during data transmissions:** Round-trip time (RTT) **36. Method of signal transmission using frequencies or pulses of light:** Fiber-optic transmission **37. Techniques using native IPv6 connectivity:** Dual Stack (IPv4 and IPv6 running together) and IPv6 tunneling **38. Terminating with BNC, N type, and F type connectors:** Coaxial cable **39. Valid source and destination ports for a host connecting to a DNS server:** **Source port:** Random high port (e.g., 49152), Destination port: 53 (DNS) **40. Valid source and destination ports for a host connecting to an email server:** **Source port:** Random high port (e.g., 49152), Destination port: 25 (SMTP), 110 (POP3), or 143 (IMAP) **41. Measure of the transfer of bits across the media:** Data rate or bandwidth **42. Name for the capacity of a medium to carry data:** Bandwidth **43. Improvement provided by IPv6 compared to IPv4:** Larger address space, better security, and more efficient routing **44. Major issue associated with IPv4:** Limited address space **45. Organization responsible for testing wireless LAN devices:** Wi-Fi Alliance **46. Organization or group of organizations receiving IP addresses from IANA:** Regional Internet Registries (RIRs) **47. Organization publishing and managing the Request for Comments (RFC) documents:** IETF (Internet Engineering Task Force) **48. OSI layer that sends segments to be encapsulated in an IPv4 or IPv6 packet:** Transport layer **49. Part of a component of an IPv4 address:** Network ID and Host ID **50. Part of a GUA assigned by the ISP:** The global routing prefix and subnet ID ***PAGE-7*** 1. Which part of an Ethernet Frame describes the higher-layer protocol that is encapsulated? The EtherType field describes the higher-layer protocol that is encapsulated. 2. Which part of an Ethernet frame detects errors in the frame? The Frame Check Sequence (FCS) detects errors in the frame. 3. Which part of an Ethernet Frame notifies the receiver to get ready for a new frame? The Interframe Gap (IFG) notifies the receiver to get ready for a new frame. 4. Which part of an Ethernet Frame uses a pad to increase the frame field to at least 64 bytes? The data field may use a pad to increase the frame to at least 64 bytes. 5. Which port group includes port numbers for FTP, HTTP, and TFTP applications? These ports are typically found in Well-Known Ports (0–1023). 6. Which portion of an IP address uniquely identifies that device on that network? The host portion of the IP address uniquely identifies the device on the network. 7. Which protocol is responsible for guaranteeing reliable delivery? TCP (Transmission Control Protocol) is responsible for guaranteeing reliable delivery. 8. Which protocol is used by routers to forward messages? Routing Protocols such as OSPF or BGP are used by routers to forward messages. 9. Which scenario describes a peer-to-peer network? A peer-to-peer network involves devices that act as both clients and servers, where each device can share resources directly with others. **10. Which shortened address is an accurate representation of the IPv6 address 2001:** 0db8:0000:0000:ab00:0000:0000:0000? **The shortened address is 2001:** db8:0:0:ab00::. 11. Which statement about host forwarding decisions is true? A host forwards packets to its default gateway if the destination is not in its local network. 12. Which statement defines a data communications protocol? A data communications protocol defines the rules for data exchange between devices on a network. 13. Which statement describes a DHCP Discover message? A DHCP Discover message is sent by a client to locate a DHCP server and request an IP address. 14. Which statement describes one purpose of the subnet mask setting for a host? The subnet mask determines which portion of an IP address is used for the network and which portion is used for the host. 15. Which statement describes the relationship of a physical network and logical IPv4 addressed networks? The physical network is concerned with hardware connections, while the logical network defines the structure of IP addressing. 16. Which statement describes the treatment of ARP requests on the local link? ARP requests are broadcasted to all devices on the local link to resolve a device's MAC address. 17. Which statement is correct about Ethernet switch frame forwarding decisions? An Ethernet switch forwards frames based on the destination MAC address. 18. Which statement is correct about IPv4 and IPv6 addresses? IPv4 addresses are 32-bit, while IPv6 addresses are 128-bit. 19. Which statement is correct about IPv4 packet header fields? The IPv4 header includes fields such as source IP, destination IP, and protocol. 20. Which statement is correct about network protocols? A network protocol defines the rules and conventions for communication between devices on a network. 21. Which statement is true about ARP? ARP (Address Resolution Protocol) is used to map an IP address to a MAC address on the local network. 22. Which statement is true about DHCP operation? DHCP automatically assigns IP addresses to devices on the network. 23. Which structured troubleshooting method attempts to locate the issue in a device or link between the source and destination? The divide and conquer method helps isolate issues between source and destination. 24. Which structured troubleshooting method attempts to resolve the problem by changing elements in the problem device or configuration to be consistent with a working one? The substitution method is used to replace components or configurations to identify the cause of the issue. 25. Which structured troubleshooting method should be used when a cabling problem is suspected? The ping test or cable testing method should be used when a cabling issue is suspected. 26. Which structured troubleshooting method should be used when a software-oriented problem occurs? The software diagnostics method should be used for software-related problems. 27. Which table does a router use to determine which interface to use to send packets to the destination network? A router uses its routing table to determine which interface to forward packets. 28. Which TCP header statement is true? The TCP header includes fields like source port, destination port, sequence number, acknowledgment number, flags, etc. 29. Which technology allows a mobile device to establish wireless communication with another mobile device by touching them together? NFC (Near Field Communication) allows devices to communicate by touching them together. 30. Which technology enables devices in an IPv6-only network to communicate with devices in an IPv4-only network? Dual Stack allows devices to communicate across IPv6 and IPv4 networks. 31. Which technology is used to uniquely identify a WLAN network? The SSID (Service Set Identifier) is used to uniquely identify a WLAN network. 32. Which technology will allow a mobile device to share an internet connection with other devices via tethering? Mobile hotspot technology enables tethering and sharing of internet connections. 33. Which term correctly describes the function of an ISP? An ISP (Internet Service Provider) supplies internet connectivity to customers. 34. Which term is used to describe a network device with the primary function of providing information to other devices? A server provides information to other devices on the network. 35. Which term refers to the process of placing one message format inside another message format? This is referred to as encapsulation. 36. Which term refers to the set of rules that define how a network operates? This is known as a network protocol. 37. Which topology displays networking device layer IP addresses? The network topology typically shows device layer IP addresses in a logical topology. 38. Which transport layer protocol ensures reliable same-order delivery? TCP ensures reliable and same-order delivery. 39. Which transport layer protocol statement is true? TCP is connection-oriented, while UDP is connectionless. 40. Which transport layer protocol would be used for VoIP applications? UDP is commonly used for VoIP applications due to its low-latency nature. 41. Which type of address does a switch use to build the MAC address table? A switch uses MAC addresses to build the MAC address table. 42. Which type of connected device is placed on objects to track and monitor them? RFID (Radio Frequency Identification) tags are used for tracking and monitoring objects. 43. Which type of ICMP messages are common to both ICMPv4 and ICMPv6? Echo request and Echo reply messages are common in both ICMPv4 and ICMPv6. 44. Which type of ICMPv6 message would a host send to acquire an IPv6 configuration when booting up? The host would send a Router Solicitation (RS) message. 45. Which type of intermediary device acts as a boundary between a home wireless network and the internet? A router typically acts as a boundary between a home wireless network and the internet. 46. Which type of IPv6 unicast address is not routable between networks? Link-local addresses are not routable between networks. 47. Which type of network cable consists of 4 pairs of twisted wires? Cat5e, Cat6, and Cat6a cables consist of 4 twisted pairs of wires. 48. Which type of network cable is commonly used in backbone networks and telephone companies? Fiber optic cables are commonly used in backbone networks and telephone companies. 49. Which type of network cable is commonly used to connect office computers to the local network? Ethernet cables (Cat5e, Cat6) are commonly used to connect office computers to the local network. 50. Which type of network media carries data encoded into electrical impulses? Copper cables (e.g., twisted pair, coaxial cables) carry data encoded into electrical impulses. ***PAGE 8*** 1. Which type of network media carries data encoded into impulses of light? Fiber optic cables carry data encoded into impulses of light. 2. Which type of network technology is used for low-speed communication between peripheral devices? Serial communication (such as RS-232) is used for low-speed communication between peripheral devices. 3. Which type of packet is sent by a DHCP server after receiving a DHCP Discover message? The DHCP server sends a DHCP Offer packet after receiving a DHCP Discover message. 4. Which type of server dynamically assigns an IP address to a host? A DHCP (Dynamic Host Configuration Protocol) server dynamically assigns IP addresses to hosts. 5. Which type of MAC address is an IPv4 multicast MAC address? **An IPv4 multicast MAC address starts with 01:** 00:5E. 6. Which type of MAC address is an IPv6 multicast MAC address? **An IPv6 multicast MAC address starts with 33:** 33. 7. Which type of MAC address is a broadcast MAC address? **The FF:** FF:FF:FF:FF:FF MAC address is a broadcast MAC address. 8. Which type of MAC address is a unicast MAC address? A unicast MAC address refers to a unique MAC address assigned to a single network interface. 9. Which type of wired media is used to carry digital information at very high speeds over long distances? Fiber optic cables are used to carry digital information at very high speeds over long distances. 10. Which type of wireless communication is based on 802.11 standards? Wi-Fi is based on the 802.11 standards. 11. Which UDP datagram reassembly statement is true? UDP does not require reassembly of datagrams, as it is connectionless and does not guarantee order. 12. Which UDP header statement is true? The UDP header contains fields such as source port, destination port, length, and checksum. 13. Which Windows command would display the protocols in use, the local address and port numbers, the foreign address and port numbers, and the connection state? The netstat command displays this information. 14. Which wired network technology has an inner wire surrounded by a tubular insulating layer, that is then surrounded by a tubular conducting shield? This describes coaxial cable. 15. Which wireless RF band do IEEE 802.11b/g devices use? IEEE 802.11b/g devices use the 2.4 GHz RF band. 16. Which wireless technology allows a customer to connect to a payment system with a smartphone? NFC (Near Field Communication) allows connection to payment systems with a smartphone. 17. Which wireless technology can be used to connect wireless headphones to a computer? Bluetooth can be used to connect wireless headphones to a computer. 18. Which wireless technology uses a device-pairing process to communicate and operates over short distances of 100 meters? Bluetooth operates over short distances and uses a device-pairing process. 19. Who is responsible for statically assigning IP addressing information? The network administrator is responsible for statically assigning IP addressing information. 20. Why is UDP desirable for protocols that make a simple request and reply transactions? UDP is desirable because it is connectionless, has low overhead, and provides faster transmission with no need for session establishment. 21. With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if necessary? This is managed by a Quality of Service (QoS) policy.

Use Quizgecko on...
Browser
Browser