Data Communications and Network 1


This course covers configuring and implementation of LAN networks.

it can rapidly adapt to the failure of network devices and communication links ·
Channel ·
The throughput is predictable ·
· Cable Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.
· Cellular Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
· Directed broadcasts are intended for all hosts on a local or remote network Which two statement describe broadcast transmissions on a wired network? (Choose two.)
· directing data packets to destination hosts on other networks What are two functions that are provided by the network layer? (Choose two.)
· Error detection What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer? (Choose three.)
· frame header Which two components are added to the PDU at the network access layer? (Choose two.)
· how connection between nodes appears to the data link layer Which two factors influence the method that is used for media access control? (Choose two.)
· Identifying the proper application for each communication stream What are the primary purposes of the transport layer? (Choose three.)
Confidentiality Integrity What are the primary requirements of information security? (Choose three.)
· Intermediary devices direct the path of the data. Which two statements describe intermediary devices? (Choose two.)
· IP phone Which devices would be considered end devices on a network? (Choose four.)
· it adds a header and trailer to form an OSI Layer 2 PDU Which two functions or operations are performed by the MAC sublayer? (Choose two.)
· it can rapidly adapt to the failure of network devices and communication links For which three reasons was a packet switched connectionless data communications technology used when developing the Internet (Choose three.)
· lacks centralized administration A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
· message size What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)
Leased lines Metro Ethernet Which of the following are business-class Internet connection technologies normally supplied by a service provider? (Choose two.)
· Network What are the parts of an IPv4 address? (Choose two.)
Scalability No centralized administration Which of the following are disadvantages of peer-to-peer networking? (Choose two.)
· Only some aspects of the router configuration can be viewed Which two statements are true regarding the user EXEC mode? (Choose two.)
Data link Physical Which of the following OSI model layers have the same functionality as the network access layer in the TCP/IP model? (Choose two.)
· Physical At which layers of the OSI model does Ethernet function? (Choose two.)
providing better social media opportunities providing a richer e-learning environment What are two benefits of collaboration and video-on-demand applications? (Choose two.)
· providing better social media opportunities What are two benefits of collaboration and video-on-demand applications? (Choose two.)
flow control response timeout Which two message timing mechanisms are used in data communication? (Choose two.)
· response timeout Which two message timing mechanisms are used in data communication? (Choose two.)
· SMTP What three protocols do email users and servers use to process email? (Choose three.)
· Source Port Which three fields are used in a UDP segment header? (Choose three.)
· startup configuration Which two files are loaded into RAM by the router when it boots? (Choose two.)
SwitchA(config)# interface vlan 1 SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0 A technician configures a switch with these commands:
· the distance the selected medium can successfully carry a signal What two criteria are used to help select a network medium from various network media? (Choose two.)
· The first 6 hexadecimal digits of a MAC address represent the OUI. What is true about the Ethernet MAC address? (Choose three.)
· They are the interface between humans and the communication network. What are two functions of end devices on a network? (Choose two.)
· Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model? (Choose two.)
IEEE Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
They vary depending on protocols Which statement describes a characteristic of the frame header fields of the data link layer?
providing the rules required for a specific type of communication to occur What is the purpose of protocols in data communications?
All devices stop transmitting and try again later. What happens when a data collision occurs on an bus?
The FTP client responds to the server with a smaller window size in the TCP header. A client is downloading a large file from a server using FTP. Many of the segments are lost during transit. What will most likely happen?
it can rapidly adapt to the failure of network devices and communication links, Data packets can travel through the network using multiple different paths, Network devices dynamically decide on the best available path to forward each packet. For which three reasons was a packet switched connectionless data communications technology used when developing the Internet (Choose three.)
TCP, UDP Which of the following TCP/IP exist at the of the TCP/IP reference model? (Choose two.)
local router Which device acts as gateway to allow hosts to send traffic to remote IP networks?
The host portion of the IP addresses will be different What happens when two devices on the same subnet are communicating?
The Telecommunications Industry Association (TIA) Which organization is responsible for developing communications standards for Voice over IP (VoIP) devices?
to test if the workstation can communicate on the network A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this command?
the privileged executive mode password What is encrypted with the enable secret command?
to identify which protocol is being used Which is a function of the Logical Link Control (LLC) sublayer?
destination IP address Which logical address is used for delivery of data to a remote network?
Network access protocol What type of protocol describes communication over a data link and the physical transmission of data on the network media?
to add a password to a Cisco network device Why would a network administrator use the CLI of the Cisco IOS?
providing a richer e-learning environment, providing better social media opportunities What are two benefits of collaboration and video-on-demand applications? (Choose two.)
to establish the media link What is the purpose of the physical link control field in a data link layer header?
router Which device performs the function of determining the path that messages should take through internet works?
Tab To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
- A link-local IPv6 address is automatically Which statement is true about an interface that is configured with the IPv6 address command?
(config) # service password-encryption What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
The client sends a synchronization segment to begin the session Which action is performed by a client when establishing communication with a server via the use of UDP at the ?
Command What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
user EXEC mode A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
UDP reassembles that data in the order it was received and passes it to the application. What does UDP do when receiving messages that are more than one datagram in length?
To notify the workstation, that another router on the same network, is the better default-gateway to reach the remote server A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?
They define how messages are exchanged between the sources and the destination Which statement is correct about network ?
International Telecommunication Union (ITU) Which two engineering organizations define open standards and protocols that apply to the data link layer?
Products from different manufacturers can interoperate successfully What is and advantage of using standards to develop and implement ?
a converged network Which type of network design combines voice, video, and data on the same communication channel?
flash During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?
Confidentiality, Integrity, Availability What are the primary requirements of information security? (Choose three.)
Products from different manufacturers can interoperate successfully What is an advantage of using standards to develop and implement ?
response timeout, flow control Which two message timing mechanisms are used in data communication? (Choose two.)
The network provides predictable levels of service to different types of traffic Which statement describes a network that supports QoS?
Data link, Physical At which layers of does function? (Choose two.)
SMTP, IMAP4, POP3 What three do email users and servers use to process email? (Choose three.)
no switchport Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to the interface?
The throughput is predictable, Devices take turns transmitting Which two statements are true of the deterministic access method?(Choose two.)
virtualization A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation?
They define how messages are exchanged between the source and the destination. Which statement is correct about network protocols?
Public IP addresses must be unique across the entire Internet Which statement accurately describes public IP addresses?
flow control What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
light In fiber optic meda, the signals are represented as patterns of
Flow control Which message timing factor impacts how much information can be sent and the speed at which it can be delivered?
Which statement is correct about network ?
when the end-user device will run an application that requires a dedicated connection to the network When is a wired connection preffered to a wireless connection by an end-user device?
forwarding rate Which term defines the processing capabilities of a switch by rating how much data can be processed per second?
providing the rules required for a specific type of communication to occur What is the purpose of in data communications?
They originate the data that flows through the network., They are the interface between humans and the communication network. What are two functions of end devices on a network? (Choose two.)
A network that can reroute traffic in case of device failure What is a fault-tolerant network?
broadcast Which message delivery option is used when all devices need to receive the same message simultaneously?
DSL Which technology would be best to provide a home user with a highspeed, always-on Internet connection?
Length, Source Port, Checksum Which three fields are used in a UDP segment header? (Choose three.)
to identify which network layer protocol is being used Which is a function of the Logical Link Control (LLC) sublayer?
Products from different manufacturers can interoperate successfully What is an advantage of using standards to develop and implement protocols?
Trailer, frame header Which two components are added to the PDU at the network access layer? (Choose two.)
Connectionless What is a characteristic of UDP?
Which command or key combination allows a user to return to the previous level in the command hierarchy?
EaSt-2+56(config)# When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the CLI, what will be returned in the CLI?
They vary depending on Which statement describes a characteristic of the frame header fields of the data link layer?
Intranet is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.
Segment What is the PDU?
It is as nondeterministic method What is a characteristic of a contention-based access method?
slower The farther you are from the central office when utilizing a DSL connection, the
Startup config Where is the configuration used during startup on Cisco IOS devices located?
providing end devices with a unique network identifier, directing data packets to destination hosts on other networks What are two functions that are provided by the ? (Choose two.)
encapsulation What process is used to place one message inside another message for transfer from the source to the destination?
IOS What will a network administrator use to modify a configuration on a Cisco router?
VoIP Which type of traffic must receive the highest priority from QoS?
to keep track of multiple conversations between devices What is the purpose of using a source port number in a TCP communication?
The operating system for the Cisco network device What is the Cisco IOS?
a farm in rural area without wired broadband access In which scenario would the use of a WISP be recommended
an address that reaches a specific  group of hosts What type of address is 01-00-5E-0A-00-02?
easy to create, lacks centralized administration, less cost to implement A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
SVI A technician configures a switch with these commands:
to copy an existing configuration into RAM Why would a technician enter the command copy startup-config running config?
No centralized administration, Scalability Which of the following are disadvantages of peer-to-peer networking? (Choose two.)
startup configuration, IOS image Which two files are loaded into RAM by the router when it boots? (Choose two.)
What is the function of the kernel of an operating software?
It is responsible for Media Access Control, it adds a header and trailer to form an OSI Layer 2 PDU Which two functions or operations are performed by the MAC sublayer? (Choose two.)
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed. An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
A network where voice, video, and data move over the same infrastructure What is a converged network?
HTTP, TCP, IP, A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
Host, Network What are the parts of an IPv4 address? (Choose two.)
Use the console port to locally access the switch from a serial or USB interface of the PC. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
congestion Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
01-00-5E-00-00-C8 Which address is a multicast MAC address?
Wiki What is a group of web pages that groups of individuals can edit and view together called?
The MTU is passed to the by the data link layer How does the use the MTU value?
ROM During troubleshooting procedures, from which location will most Cisco routers load a limited IOS
Frame Check Sequence Which field in an frame is used for error detection?
broadcast What type of communication will send a message to all devices on a local area network?
IEEE 802.3 Which standard specifies the MAC sublayer functionality in a computer NIC?
They define how messages are exchanged between the sources and the destination Which statement is correct about network protocols?
data encoding, message size, delivery options What three functions are defined by network to allow communication between known source and destination IP addresses? (Choose three.)
128 Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks?
UDP communication requires less overhead What is an advantage of UDP over TCP?
the distance the selected medium can successfully carry a signal, the environment where the selected medium is to be installed What two criteria are used to help select a network medium from various network media? (Choose two.)
link-local address Which type of IPv6 address is not routable and used for communication on a single subnet?
a router Which device performs the function of determining the path that messages should take through internet works?
Internet Which TCP/IP model layer is responsible for providing the best path through the network?
Application, presentation, session The TCP/IP effectively consists of which three OSI layers?
data encoding, message size, delivery options What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)
DSL, cable Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)
The branch sites are connected to a central site through point-point links What is a characteristic of a WAN hub-and-spoke topology?
SMTP Which application use UDP as the protocol?
Which PDU is processed when a host computer is de-encapsulating a message at the of the TCP/IP model?
This is the default mode on an unconfigured router when first powered up., Only some aspects of the router configuration can be viewed Which two statements are true regarding the user EXEC mode? (Choose two.)
It does not allow spaces Which statement describes a feature of an IOS host name configuration?
Printer, IP phone, Server, Tablet computer Which devices would be considered end devices on a network? (Choose four.)
mac sublayer is responsible for communicating directly with the physical layer.
SSH A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
Source, Channel, Receiver Which of the following elements do both human and computer communication systems have in common? (Choose three.)
how connection between nodes appears to the data link layer, how nodes share the media Which two factors influence the method that is used for media access control? (Choose two.)
Port What is assigned by the to identify an application or service?
the original source port number that was randomly generated by the client When a client connects to an HTTP server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response?
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
192.168.1.1:80 Which number or set of numbers represents a socket?
local delivery What type of delivery uses data link layer addresses?
IAB What organization is responsible for the overall management and development of Internet standards?
Low overhead What is an advantage that UDP has over TCP?
Intermediary devices direct the path of the data., Intermediary devices connect individual hosts to the network. Which two statements describe intermediary devices? (Choose two.)
Scalable network is able to expand to accept new devices and applications without affecting performance.
A link-local IPv6 address is automatically Which statement is true about an interface that is configured with the IPv6 address command?
They are dropped. What happens to frames that are too long or too short for the channel used?
HTTP, TCP, IP, Ethernet A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
Protocol suite What name is given to a group of interrelated necessary to perform a communication function?
AppleTalk, Novell NetWare Which of the following are examples of proprietary ? (Choose two.)
a web page that groups of people can edit and review What is a wiki?
spyware During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer
Type the command and then press the? key A network administer has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly?
, Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
Window size Which TCP header field specifies the number of bytes that can be accepted before an acknowledgement is required?
cellular, satellite Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
latency An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain
The part of the FTP message that was lost is re-sent What happens if part of an FTP message is not delivered to the destination?
a VTY password What is the primary defense against unauthorized remote access to network devices?
segment Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
Multicast What is the name given to a one-to-many message delivery option?
FFFF.FFFF.FFFF Which destination address is used in an ARP request frame?
wireless LAN Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?
exit Which command or key combination allows a user to return to the previous level in the command hierarchy?
an intranet An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
Console port What type of connection to a Cisco IOS switch is used to make the initial configuration?
applications Which entities are involved in a temporary communication that is established by the ?
FF-FF-FF-FF-FF-FF Which address is used as a destination address on a broadcast frame?
Physical, Data link Which of the following OSI model layers have the same functionality as the network access layer in the TCP/IP model? (Choose two.)
Frame delimiting, Addressing, Error detection What are the primary functions associated with data encapsulation at the MAC sublayer? (Choose three.)
an address that reaches a specific group of hosts What type of address is 01-00-5E-0A-00-02?
Directed broadcasts are intended for all hosts on a local or remote network, Limited broadcasts are only intended for the hosts on a local network Which two statement describe broadcast transmissions on a wired network? (Choose two.)
Leased lines, Metro Which of the following are business-class Internet connection technologies normally supplied by a service provider? (Choose two.)
to display the host routing table What is the command netstat –r used for?
applications Which entities are involve in a temporary communication that is established by the ?
Flow Label When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?
experimental A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?
it can rapidly adapt to the failure of network devices and communication links, Data packets can travel through the network using multiple different paths, Network devices dynamically decide on the best available path to forward each packet For which three reasons was a packet switched connectionless data communications technology used when developing the Internet (Choose three.)
Switch# show? What command will display a list of keywords available for viewing the status of an IOS switch?
Presentation Which OSI reference model layer is responsible for common representation of the data transferred between services?
64 bytes – 1518 bytes What is the minimum and maximum frame size as defined by IEEE 802.3?
a farm in a rural area without wired broadband access In which scenario would the use of a WISP be recommended?
IP addressing scheme What type of information would be found on a logical topology diagram?
loopback address is defined as a reserved address that routes packets back to the host
Time-to-Live Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?
The kernel provisions hardware resources to meet software requirements. What is the function of the kernel of an operating software?
The first 6 hexadecimal digits of a MAC address represent the OUI., The vendor is responsible for assigning the last 24 bits of the MAC address., The MAC address is also known as a burned-in address. What is true about the MAC address? (Choose three.)
spyware During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
gateway of last resort Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?
Frame What is the name given to the MAC sublayer PDU?
This is the default mode on an unconfigured router when first powered up, Only some aspects of the router configuration can be viewed Which two statements are true regarding the user EXEC mode? (Choose two.)
1024 to 49151 What range of ports can either be used by TCP or UDP to identify the requested service on the destination device or as a client source port?
FTP Which protocol allows users on one network to reliably transfer files to and from a host on another network?
Through the CLI using a terminal emulator How is the Cisco IOS generally accessed and navigated?
The default gateway address is used to forward packets originating from the switch to remote networks. Within a production network, what is the purpose of a switch with a default gateway address?
IEEE Which organization is responsible for the standard that defines Media Access Control for wired ?
slower
VoIP
intranet
to copy an existing configuration into RAM
A ____ network is able to expand to accept new devices and applications without affecting performance.
LAN What is a network infrastructure that provides access to other networks over a wide geographic area?
spyware
Configuring a VTY password What is the primary defense against unauthorized remote access to network devices?
DSL
FTP Which application layer protocol allows users on one network to reliably transfer files to and from a host on another network?
IAB
IOS
loopback A ___ address is defined as a reserved address that routes packets back to the host
Segment What is the transport layer PDU?
to identify which network layer protocol is being used
Products from different manufacturers can interoperate successfully What is and advantage of using standards to develop and implement protocols?
light In fiber optic meda, the signals are represented as patterns of ­
Flow control Which message timing factor impacts how much information can be sent and the speed at which it can be delivered
(config) # service password-encryption
IEEE
Presentation Which OSI reference model layer is responsible for common representation of the data transferred between application layer services?
Protocol suite What name is given to a group of interrelated protocols necessary to perform a communication function?
wireless LAN Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school
MAC The Ethernet ___ sublayer is responsible for communicating directly with the physical layer.
scalable A  ___ network is able to expand to accept new devices and applications without affecting performance.
intranet An ___ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization
congestion hich term describes the state of a network when the demand on the network resources exceeds the available capacity?
The client sends a synchronization segment to begin the session Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
broadcast On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the___ MAC address
The MTU is passed to the network layer by the data link layer How does the network layer use the MTU value?
applications Which entities are involve in a temporary communication that is established by the transport layer?
runt A collision fragment, also known as a ___ frame, is a frame of fewer than 64 bytes in length.
The default gateway address is used to forward packets originating from the switch to remote networks Within a production network, what is the purpose of configuring a switch with a default gateway address?
FF-FF-FF-FF-FF-FF Which address is used as a destination address on a broadcast Ethernet frame?
To notify the workstation, that another router on the same network, is the better defaultgateway to reach the remote server A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?
SMTP Which application use UDP as the transport layer protocol?
IEEE 802.3 Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC?
10.15.25.254 The last host address on the 10.15.25.0/24 network is
101001 The 8-bit binary value for 41 is
Frame What is the name given to the Ethernet MAC sublayer PDU?
2001:DB8:0:1470::200 The shortest compressed format of the IPv6 address 2001: 0DB8:0000:1470:0000:0000:0000:0200 is
Frame Check Sequence Which field in an Ethernet frame is used for error detection?
64 bytes – 1518 bytes What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3?
All devices stop transmitting and try again later. What happens when a data collision occurs on an Ethernet bus?
applications Which entities are involved in a temporary communication that is established by the transport
Products from different manufacturers can interoperate successfully Standards provide flexibility for manufacturers to create devices that comply with unique requirements
Application, presentation, session The TCP/IP application layer effectively consists of which three OSI layers?
1024 to 49151 What is a characteristic of UDP? What range of ports can either be used by TCP or UDP to identify the requested service on the destination device or as a client source port?
Port What is assigned by the transport layer to identify an application or service?
#SarcasticGamer #SarcasticReview

What do you think of this blog? Write down at the COMMENT section below.

No comments:

About Simpro